Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing

Navjeet Singh, Rimple Ahuja

Cloud Computing is a model which is used for the delivery of appropriate and on-demand network access. Cloud Computing enables a user to accumulate the data in the cloud and access it directly from anywhere with the help of internet without the use of any hardware storage device. But, while the storage and accessing of data, Cloud Computing faces many complications such as security, congestion or traffic or management of resources. The security to the cloud can be provided by the means of data, storage and network. Hence, to provide the secure data storage and retrieval, many techniques have been proposed in the form of symmetric several cryptographic algorithms like symmetric and asymmetric key algorithms which encrypts the message to be sent. But, the previous techniques also faces some of the drawbacks which diminishes the functionality of Cloud Computing. To provide, secure data storage and retrieval, Fully Homomorphic encryption is being used in this paper which works on the concept of asymmetric key algorithm. This encryption technique provides specific types of computations to be taken out on ciphertext and also to obtain the outcomes in the form of encryption which then matches with the original text after the decryption. But, to reduce the size of data after the encryption in fully homomorphic scheme, the fuzzy rules are put into practice for the reduction of encrypted data in fully homomorphic scheme. The simulator used in this paper is MATLAB. The simulation results reveal that the proposed algorithm outperforms the previous one by reducing the size of encrypted and compressed data.

Keywords: Cloud Computing, Fully Homomorphic Encryption FHE, Encryption, Decryption, Security, Fuzzy Rules

Edition: Volume 3 Issue 8, August 2014

Pages: 968 - 972

Share this Article

How to Cite this Article?

Navjeet Singh, Rimple Ahuja, "Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015412, Volume 3 Issue 8, August 2014, 968 - 972

128 PDF Views | 111 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Similar Articles with Keyword 'Decryption'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Similar Articles with Keyword 'Fuzzy Rules'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 609 - 612

Review on Data Mining using Neural Network

Rasika Ashokrao Dugane, A. B. Raut

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2791 - 2796

Design and Implementation of Association Rules Based System for Evaluating WSD

Samit Kumar, Dr. S. Niranjan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 968 - 972

Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing

Navjeet Singh, Rimple Ahuja

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1103 - 1107

A Survey on the Design of Fuzzy Classifiers Using Multi-Objective Evolutionary Algorithms

Praveen Kumar Dwivedi, Surya Prakash Tripathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 494 - 497

Design of An Adaptive Neuro-Fuzzy Inference System for Floating Point Function Generation using CORDIC Algorithm

Priyanka V. Titare, Girish R. Talmale

Share this Article
Top