A Review of Security of Data Storage and Retrieval on Cloud using Homomorphic Encryption
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
P. Mell and T. Grance, "Draft NIST working definition of cloud computing - v15," 21. Aug 2009.
Craig Gentry, "Computing Arbitrary Functions of Encrypted Dataâ€, Communications of the ACM, VOL. 53, No. 3, pp.97-105, march 2010.
Ryan Hayward and Chia-Chu Chiang, “Parallelizing fully homomorphic encryption for a cloud environmentâ€, Journal of Applied Research and Technology (available online at science direct), Vol. 13, pp. 245-252, August 2015.
S.G Sutar and G. A. Patil, " Privacy Management in Cloud by making use of Homomorphic Functionsâ€, International Journal of Computer Applications, Vol. 37, No.2, pp.0975-8887, January 2012.
Maha Tebaa, Saïd El Hajji, Abdellatif El Ghazi “Homomorphic Encryption Applied to the Cloud Computing Securityâ€, Proceedings of the World Congress on Engineering, Vol.1, WCE 2012, July 4 - 6, 2012.
P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,†in EUROCRYPT, Vol. 1592, pp. 223–238, 1999.
Julien Bringe and al. “An Application of the Goldwasser-Micali Cryptosystem to Biometric Authenticationâ€, Springer-Verlag, 2007.
R. Rivest, A. Shamir, and L. Adleman. “A method for obtaining digital signatures and public key cryptosystemsâ€, Communications of the ACM, 21(2):120-126, 1978. Computer Science, pp. 223-238, Springer, 1999.
Taher ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithmsâ€, IEEE Transactions on Information Theory, pp. 469-472, 1985.
Craig Gentry, “Fully homomorphic encryption using ideal latticesâ€, in Proceedings of the 41 Annual ACM Symposium on Theory of Computing, pp. 169–178, 2009.
Zvika Brakerski and Vinod Vaikuntanathan, “Effcient Fully Homomorphic Encryption from (Standard) LWEâ€, 52 Annual IEEE Symposium on Foundations of Computer Science from IEEE Computer Society, pp.97-106, 2011.
Deyan Chen and Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computingâ€, International Conference on Computer Science and Electronics Engineering From IEEE Computer Society, pp.647-651, 2012.
M. Brenner, H. Perl, and M. Smith, “Practical applications of homomorphic encryption†,in SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, SECRYPT is part of ICETE - The International Joint Conference on e Business and Telecommunications, pp. 5–14, july 2012.
S. Mei, C. Liu, C. Yong, W. Jiangjiang and W. Zhiying, “TETPA: A case for trusted third party auditor in Cloud environmentâ€, IEEE Conference Anthology, pp-1 – 4, 1-8 Jan. 2013.
Simon Fau,Renaud Sirdey, Caroline Fontaine, Carlos Aguilar-Melchor and Guy Gogniat, "Towards practical program execution over fully homomorphic encryption schemes", IEEE Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.284-290, 2013.
Bhabendu Kumar Mohanta and Debasis Gountia, “Fully homomorphic encryption equating to cloud security: An approach†IOSR Journal of Computer Engineering (IOSRJCE), e-ISSN. (2278-0661), p- ISSN.(2278-8727), Vol. 9, No. 2, PP. 46-50, jan-feb 2013.
W. Wang, Y. Hu, L. Chen, X. Huang, and B. Sunar, “Exploring the feasibility of fully homomorphic encryption†, IEEE Transactions on Computers, vol. 99, pp. 1, 2013.
FENG Chao and XIN Yang, “Fast key generation for Gentry-style homomorphic encryptionâ€, The Journal of China Universities of Posts and Telecommunications, Vol. 21, No. 6, pp. 37-44, December 2014.
G.jeeva Rathanam and M.R. Sumalatha, “Dynamic Secure Storage System in Cloud Servicesâ€, IEEE International Conference on Recent Trends in Information Technology.
Darko Hrestak and Stjepan Picek, “Homomorphic Encryption in the Cloudâ€, MIPRO, may 2014.
Kamal Kumar Chauhan, Amit K.S Sanger, Ajai Verma, “Homomorphic Encryption for Data Security in Cloud Computingâ€, IEEE International Conference on Information Technology, pp.206-209, 2015.
Ali Azougaghe, Zaid Kartit, Mustapha Hedaboui, Mostafa Belkasmi, Mohamed El marraki, “An Efficient Algorithm for Data Security in Cloud Storage â€, 15th International Conference on Intelligent Systems Design and Applications (ISDA), pp.421-427, 2015.
Ayantika Chatterjee and Indranil Sengupta, “Translating Algorithms to handle Fully Homomorphic Encrypted Data on the Cloudâ€, IEEE Transactions on Cloud Computing, pp. 1-14, September 2015.
Yasmina Bensitel and Rahal Romadi, “Secure data storage in the cloud with homomorphic encryption “, 2nd International Conference on Cloud Computing and Applications, 24-26 may 2016.
Gnanaprakasam T and Dr. Rajivkannan A, “Optimal ecc based dual encryption technique for data security in cloudâ€, International Journal of Advanced Engineering Technology, e-ISSN(0976-3945), Vol.7,no.2,pp.1049-1055, April-June 2016.
Prof. S.V.Phulari, Sneha Jamadade, Swati Mhetre, Pramila Gonde and Jyoti Birajdar, “Cloud Computing Security using Data Partitioning Techniqueâ€, International Journal of Engineering Science andComputing(IJESC),ISSN(2321-3361),Vol.6,No.4,pp.4595-4597,April 2016.
Ms. Nikita N Chintawar, Ms. Sonali J Gajare, Ms. Shruti V Fatak, Ms. Sayali S Shinde and Prof. Gauri Virkar, “Enhancing Cloud Data Security Using Elliptical Curve Cryptographyâ€, International Journal of Advanced Research in Computer and Communication Engineering(IJARCE), ISSN (Online) (2278-1021) ISSN(Print)(2319-5940), Vol.5, No.3, pp.94-97,march 2016.
Manish M. Potey, Dr. C. A. Dhote and Deepak H.Sharma, “Efficient Homomorphic Encryption using ECC-ElGamal Scheme for Cloud Dataâ€, 3rd International Conference on Electrical, Electronics, Engineering Trends, Communication, Optimization and Sciences (EEECOS),pp.39-43,2016.
Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki El Belrhiti El Alaoui, "A Secure Cloud Computing Architecture Using Homomorphic Encryptionâ€, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 2, pp.293-298, 2016.
Babitha.M.P and K.R Remesh Babu, "Secure Cloud Storage Using AES Encryptionâ€, IEEE International Conference on Automatic Control and Dynamic Optimization Techniques, pp.859-864, 2016.
J. Daemen & V. Rijmen, " The design of Rijndael: AES-the advanced encryption standardâ€, Springer Science & Business Media, 2013.