📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 5, ISSUE 5, MAY 2016

Cloud Computing Security Applied by Homomorphic Encryption

Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari

DOI: 10.17148/IJARCCE.2016.55218

Abstract: Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, which provides the capability to use computing and storage resources on a rented basis and reduce the investments in an organization�s computing infrastructure. With all its benefits, cloud computing also brings with it concerns about the security and privacy of information extant on the cloud as a result of its size, structure, and geographical dispersion. Cloud computing security challenges and it�s also an issue to many researchers; first priority was to focus on security which is the biggest concern of organizations that are considering a move to the cloud. There are two major challenges to the Cloud Computing providers: first is How to guaranty a better data security and second is how we can keep the client private information confidential. When the data transferred to the Cloud we use standard encryption methods to secure the operations and the storage of the data. But to process data located on a remote server, the Cloud providers need to access the raw data. In this paper we are proposing an application of a method to execute operations on encrypted data without decrypting them which will provide us with the same results after calculations as if we have worked directly on the raw data.



Keywords: Homomorphic Encryption; Cloud Computing; Security; Confidentiality; Integrity.

How to Cite:

[1] Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari, “Cloud Computing Security Applied by Homomorphic Encryption,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2016.55218