International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing

Navjeet Singh, Rimple Ahuja

Cloud Computing is a model which is used for the delivery of appropriate and on-demand network access. Cloud Computing enables a user to accumulate the data in the cloud and access it directly from anywhere with the help of internet without the use of any hardware storage device. But, while the storage and accessing of data, Cloud Computing faces many complications such as security, congestion or traffic or management of resources. The security to the cloud can be provided by the means of data, storage and network. Hence, to provide the secure data storage and retrieval, many techniques have been proposed in the form of symmetric several cryptographic algorithms like symmetric and asymmetric key algorithms which encrypts the message to be sent. But, the previous techniques also faces some of the drawbacks which diminishes the functionality of Cloud Computing. To provide, secure data storage and retrieval, Fully Homomorphic encryption is being used in this paper which works on the concept of asymmetric key algorithm. This encryption technique provides specific types of computations to be taken out on ciphertext and also to obtain the outcomes in the form of encryption which then matches with the original text after the decryption. But, to reduce the size of data after the encryption in fully homomorphic scheme, the fuzzy rules are put into practice for the reduction of encrypted data in fully homomorphic scheme. The simulator used in this paper is MATLAB. The simulation results reveal that the proposed algorithm outperforms the previous one by reducing the size of encrypted and compressed data.

Keywords: Cloud Computing, Fully Homomorphic Encryption FHE, Encryption, Decryption, Security, Fuzzy Rules

Edition: Volume 3 Issue 8, August 2014

Pages: 968 - 972


How to Cite this Article?

Navjeet Singh, Rimple Ahuja, "Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015412, Volume 3 Issue 8, August 2014, 968 - 972

25 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 4, April 2020

Pages: 1517 - 1523

IT Infrastructure & Enterprise Applications - Organizations Strategy and Planning

Anshuman Awasthi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2037 - 2038

A Survey on Service Management Mechanisms in Service Oriented Computing

Anish Bhagwat

Share this article



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article



Similar Articles with Keyword 'Decryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 712 - 715

Hierarchical CP-ABE Scheme Implementation on Amazon EC2 Cloud

D. N. Rewadkar, V. S. Dhumal

Share this article



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article



Similar Articles with Keyword 'Fuzzy Rules'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 494 - 497

Design of An Adaptive Neuro-Fuzzy Inference System for Floating Point Function Generation using CORDIC Algorithm

Priyanka V. Titare, Girish R. Talmale

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2791 - 2796

Design and Implementation of Association Rules Based System for Evaluating WSD

Samit Kumar, Dr. S. Niranjan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 968 - 972

Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing

Navjeet Singh, Rimple Ahuja

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1103 - 1107

A Survey on the Design of Fuzzy Classifiers Using Multi-Objective Evolutionary Algorithms

Praveen Kumar Dwivedi, Surya Prakash Tripathi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 609 - 612

Review on Data Mining using Neural Network

Rasika Ashokrao Dugane, A. B. Raut

Share this article
Top