Security and Storage Management of Data on Cloud using Fully Homomorphic Encryption and Adaptive Compression Approach
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016

Security and Storage Management of Data on Cloud using Fully Homomorphic Encryption and Adaptive Compression Approach

Bikramjeet Singh Bumrah, Gurbind Kaur

Cloud computing depends on sharing of assets to accomplish intelligibility and economies of scale, like a utility (like the power matrix) over a network. At the establishment of cloud computing is the more extensive idea of met foundation and imparted administrations. Data is uploaded on the cloud. Data is encrypted using some type of encryption. Encryption data is encrypted using fully Homomorphic Encryption. With the help of FHE, the owner does not need to decrypt the data or provide the private key to the trusted third party for computation. The third party can themselves perform the computation, the result of which will be sent to the owner of the data. The owner will then decrypt the result using its private key and will send back the result in decrypted form. This can be achieved by using OTP (One Time Password). OTP is generated at each login and it is sent to the partys registered mobile or email address. Using the OTP, one can successfully login. Another problem that is created is the size of data using FHE increases tremendously which needs to be solved using some kind of lossless compression technique.

Keywords: Cloud Computing, Fully Homomorphic, OTP

Edition: Volume 5 Issue 6, June 2016

Pages: 482 - 486

Share this Article

How to Cite this Article?

Bikramjeet Singh Bumrah, Gurbind Kaur, "Security and Storage Management of Data on Cloud using Fully Homomorphic Encryption and Adaptive Compression Approach", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164164, Volume 5 Issue 6, June 2016, 482 - 486

132 PDF Views | 110 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Similar Articles with Keyword 'Fully Homomorphic'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 968 - 972

Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing

Navjeet Singh, Rimple Ahuja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 410 - 412

Multi Keyword Searching Techniques over Encrypted Cloud Data

P. Shanmuga Priya, R. Sugumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 482 - 486

Security and Storage Management of Data on Cloud using Fully Homomorphic Encryption and Adaptive Compression Approach

Bikramjeet Singh Bumrah, Gurbind Kaur

Share this Article

Similar Articles with Keyword 'OTP'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 2199 - 2202

A Secure OTP Algorithm using Smartphone Application ? Proposed Approach

Sonal N. Pannase, P. R. Pardhi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1619 - 1622

A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack

Shreyal Deshmukh, Priyanka More

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2465 - 2468

E-Voting Using Face Detection and Recognition (FDR), One Time Password (OTP)

Vahbiz Pardiwalla, Danista. S. Shaikh, Pooja Bhosale, Prof. J. R. Pansare

Share this Article
Top