Challenges of Using Homomorphic Encryption to Secure Cloud Computing

被引:0
作者
El Makkaoui, Khalid [1 ]
Ezzati, Abdellah [1 ]
Beni Hssane, Abderrahim [2 ]
机构
[1] Hassan 1st Univ, LAVETE Lab, Math & Comp Sci Dept, Sci & Tech Fac, Settat, Morocco
[2] Chouaib Doukkali Univ, Dept Comp Sci, Fac Sci, LAROSERI Lab, El Jadida, Morocco
来源
2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15) | 2015年
关键词
Cloud Computing; Security; Confidentiality; Trust; Homomorphic Encryption;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control and access to services. All these elements help to preserve data security and ensuring the availability of services associated with the Cloud, to better satisfy clients and acquire and build their trust. However, even if the data storage security in cloud servers is assured, reluctance remain when it comes to process the confidential data. Indeed, the fear that sensitive data is being used is a major obstacle in the adoption of cloud services by enterprises. To overcome this obstacle, the use of methods that can perform operations on encrypted data without knowing the secret key, seems to be an effective way to strengthen the confidentiality of information. In this paper we will examine the challenges facing Homomorphic Encryption methods to allow suppliers of cloud to perform operations on encrypted data, and provide the same results after treatment, as if they were performing calculations on raw data.
引用
收藏
页码:343 / 349
页数:7
相关论文
共 20 条
[11]   Homomorphic Encryption [J].
Ogburn, Monique ;
Turner, Claude ;
Dahal, Pushkar .
COMPLEX ADAPTIVE SYSTEMS: EMERGING TECHNOLOGIES FOR EVOLVING SYSTEMS: SOCIO-TECHNICAL, CYBER AND BIG DATA, 2013, 20 :502-509
[12]  
Paillier Pascal, 1999, 18 ANN EUR C EUROCRY, V1592
[13]  
Rao G. VNKV Subba, 2013, INT J ADV RES COMPUT, V3, P590
[14]  
Rivest R., 1999, COMPUTER SCI, P223
[15]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
[16]  
Subba Rao Gorti VNKV, 2013, GLOBAL J COMPUT SCI, V13, P20
[17]  
Tebaa Maha, 2013, International Journal of Advancements in Computing Technology, V5, P29
[18]  
Xiang Guang-li, 2006, Wuhan University Journal of Natural Sciences, V11, P181, DOI 10.1007/BF02831727
[19]  
Xiang Guangli, 2012, Proceedings of the 2012 International Conference on Communication Systems and Network Technologies (CSNT 2012), P978, DOI 10.1109/CSNT.2012.208
[20]  
Yi X., 2014, SPRINGER BRIEFS COMP, P27