Homomorphic Encryption Security For Cloud Computing

1
J.Phani Prasad
J.Phani Prasad

Send Message

To: Author

GJCST Volume 19 Issue B1

Article Fingerprint

ReserarchID

CSTB59S78

Homomorphic Encryption Security For Cloud Computing Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

As the Data and Technology is increasing day by day the security and privacy issues are becoming a major concern now a days, with the advent of different security mechanisms there are some bottlenecks. In this work we are giving the essence and importance of an encryption scheme called homomorphic encryption and its related issues.

11 Cites in Articles

References

  1. Taher El,Gamal (1985). A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.
  2. Shahzadi Farah (2012). An Experimental Study on Performance Evaluation of Asymmetric Encryption Algorithms.
  3. Rivest Ronald,L,Adleman Leonard,M,Dertouzos Michael (1978). Preserving Confidential Data Using Improved Rivest-Shamir Adleman to Secure Multi-Cloud.
  4. Carlos Aguilar-Melchor,Simon Fau,Caroline Fontaine,Guy Gogniat,Renaud Sirdey (2013). Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain.
  5. Liu Wentao (2012). Research on Cloud Computing Security Problem and Strategy.
  6. S Ramgovind,M Eloff,E Smith (2010). The Management of Security in Cloud Computing.
  7. A W S Naser,Bin Md,Fadli (2013). Use of Cryptography in Cloud Computing.
  8. Turner Ogburn Monique,Dahal Claude,Pushkar (2013). Homomorphic Encryption.
  9. Rastogi Garima,Sushil Rama (2015). Cloud Computing Implementation: Key Issues and Solution.
  10. Craig Gentry (2009). Fully homomorphic encryption using ideal lattices.
  11. Garima Rastogi,Rama Sushil (2015). cloud computing security and homomorphic Encryption.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

J.Phani Prasad. 2019. \u201cHomomorphic Encryption Security For Cloud Computing\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 19 (GJCST Volume 19 Issue B1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-B Classification: K.6.m
Version of record

v1.2

Issue date

March 14, 2019

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 5325
Total Downloads: 1510
2026 Trends
Research Identity (RIN)
Related Research

Published Article

As the Data and Technology is increasing day by day the security and privacy issues are becoming a major concern now a days, with the advent of different security mechanisms there are some bottlenecks. In this work we are giving the essence and importance of an encryption scheme called homomorphic encryption and its related issues.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Homomorphic Encryption Security For Cloud Computing

J.Phani Prasad
J.Phani Prasad

Research Journals