Cloud Security based on the Homomorphic Encryption

被引:0
作者
Al-Sit, Waleed T. [1 ]
Al-Zoubi, Hani [1 ]
Al-Jubouri, Qussay [2 ]
机构
[1] Mutah Univ, Dept Comp Engn, Al Karak, Jordan
[2] Univ Technol Baghdad, Dept Commun Engn, Baghdad, Iraq
关键词
Cloud computing; homomorphic encryption; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.
引用
收藏
页码:300 / 307
页数:8
相关论文
共 18 条
[1]  
Ahmad Iram., 2014, Int J Inf Comput Technol, V4, P1519
[2]  
Alani M. M., 2014, J ADV COMPUTER SCI T, V3
[3]  
[Anonymous], 2014, UN SOFTWARE ALLIANCE
[4]  
Ashktorab Vahid, 2012, INT J APPL INNOVATIO, V1
[5]  
Bajpai S., 2014, INT J INFORM COMPUTA, V4
[6]   Homomorphic Encryption for Data Security in Cloud Computing [J].
Chauhan, Kamal Kumar ;
Sanger, Amit K. S. ;
Verma, Ajai .
2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, :206-209
[7]  
Dowlin N., 2017, P IEEE
[8]  
Gupta K., 2016, International Journal for Innovative Research in Science & Technology (IJIRST), V2
[9]  
Hashizume K., 2013, ANAL SECURITY ISSUES, P1
[10]  
Kuila S., 2016, J COMPUTER MATH SCI, V7