2015 IEEE International Advance Computing Conference (IACC) 2015
DOI: 10.1109/iadcc.2015.7154867
|View full text |Cite
|
Sign up to set email alerts
|

A mixed homomorphic encryption scheme for secure data storage in cloud

Abstract: Cloud computing has been considered as the architectural model for future generation Information Technology. Inspite of its numerous advantages in both technical and business aspects, cloud computing still poses new challenges particularly in data storage security. The main threat here is trustworthiness. Data centers which power a cloud cannot perform computations on encrypted data stored on cloud. With the advances in homomorphic encryption techniques, data stored in cloud can be analyzed without decryption … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The closer the value is to 1, the more accurately the model describes the available data. The value of R 2 is calculated according to the following formula: R 2 = 1 − S res S tot (18) where S tot = ∑ n i=1 T i − T 2 and T = 1 n ∑ n i T i . The value of R 2 for each implementation depends on the degree of polynomial extrapolation.…”
Section: Extrapolationmentioning
confidence: 99%
“…The closer the value is to 1, the more accurately the model describes the available data. The value of R 2 is calculated according to the following formula: R 2 = 1 − S res S tot (18) where S tot = ∑ n i=1 T i − T 2 and T = 1 n ∑ n i T i . The value of R 2 for each implementation depends on the degree of polynomial extrapolation.…”
Section: Extrapolationmentioning
confidence: 99%
“…Our aim is to cover two security issues namely confidentiality and privacy of the data stored and to achieve our aim homomorphic encryption methods are used as they are highly capable of providing data security in terms of confidentiality and privacy. The proposed method is built upon considering BGV method as the basis [17] method and the basic functions of BGV method are as shown in In this work attempt is made to enhance the efficiency of BGV method by modifying the key switching matrix with the help of permutation and the metadata production is computed based on Elliptic Curve Cryptography method. The methodology of the proposed method is explained as follows.…”
Section: Work Donementioning
confidence: 99%
“…This method is called Module Switching Technology. The formal method can be defined as follows: for an integer in the vector x and integer's q> p> m, x 'is defined as x' ← Scale (x, q, pr, r) and x 'is the vector R, which is closer (p / q .x, corresponding to x '= x mod r [2]…”
Section: He Schemes In Cloud Storage-challengesmentioning
confidence: 99%
“…service providers with the development language and iii) software is the service are the services in which client applications are run on the infrastructure provided by the service providers. For all these services, users do not need to manage or manage the cloud infrastructure, including the network, server, operating system, storage, and even application functions [2]. The fact that technology users use the services offered by service providers is partly due to the fact that confidentiality of data storage confidentiality is not fully known to users [3].…”
Section: Introductionmentioning
confidence: 99%