International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 106

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014


A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma


Abstract: Cloud computing brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers which is not within the same trusted domain as data owners. Homomorphic encryption is a form of security technique which allows specific types of computations to be carried out on encrypted data (text) and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. To keep sensitive user data confidential against untrusted servers, cryptographic methods are used by disclosing data decryption keys only to authorized users. There are various cryptographic methods are used by disclosing data decryption keys only to authorized users To keep sensitive user data confidential against untrusted servers. In this paper, a review on different encryption techniques is done to protect cloud data. [10]


Keywords: Homomorphic encryption, cloud computing, Unpadded RSA, security, AES


Edition: Volume 3 Issue 7, July 2014,


Pages: 1398 - 1401


How to Cite this Article?

Ramandeep Kaur, Ashish Verma, "A Review on Encryption Techniques to Secure a Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=201412441, Volume 3 Issue 7, July 2014, 1398 - 1401

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Homomorphic encryption'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3273 - 3277

Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing

Farhat Afshan, Shameem Akther

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1093 - 1096

Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation

Madhuri. P, Jayavarthini. C

Share this Article

Similar Articles with Keyword 'cloud computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'security'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'AES'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

Similar Articles with Keyword 'Homomorphic'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3273 - 3277

Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing

Farhat Afshan, Shameem Akther

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'RSA'

Downloads: 1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021

Pages: 853 - 859

A Brief Survey and Examination of Various Searching Techniques

Cherukuri Nischay Sai

Share this Article

Downloads: 8

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1567 - 1572

A Survey on the Applications of Generative Adversarial Networks

Ashish Roy, Dr. B. G. Prasad

Share this Article
Top