2016
DOI: 10.14569/ijacsa.2016.070241
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Cloud Computing Architecture Using Homomorphic Encryption

Abstract: Abstract-The Purpose of homomorphic encryption is to ensure privacy of data in communication, storage or in use by processes with mechanisms similar to conventional cryptography, but with added capabilities of computing over encrypted data, searching an encrypted data, etc. Homomorphism is a property by which a problem in one algebraic system can be converted to a problem in another algebraic system, be solved and the solution later can also be translated back effectively. Thus, homomorphism makes secure deleg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…they have incorrect decrypt). This is the main limitation of SWHE schemes and this is the reason why they cannot perform just a limited number of computations [17]. Gentry shows that you can manage designing an SWHE scheme that supports the evaluation of its own decryption algorithm (and a little more).…”
Section: A Gentry's Fully Homomorphic Encryption Using Ideal Latticesmentioning
confidence: 99%
“…they have incorrect decrypt). This is the main limitation of SWHE schemes and this is the reason why they cannot perform just a limited number of computations [17]. Gentry shows that you can manage designing an SWHE scheme that supports the evaluation of its own decryption algorithm (and a little more).…”
Section: A Gentry's Fully Homomorphic Encryption Using Ideal Latticesmentioning
confidence: 99%
“…V. FULLY HOMOMORPHIC ENCRYPTION Fully Homomorphic Encryption (FHE) allows the CSP to perform unlimited number operation like addition, multiplication, sorting for unlimited number of times [11,13]. The first practical FHE was proposed by Craig Gentry in his Ph.D. thesis in the year 2009.…”
Section: Homomorphicmentioning
confidence: 99%
“…Initially, the user encrypts the data using a secure encryption technique which supports homomorphic operations on cipher text viz., the user encrypts the data with RSA algorithm, which supports multiplicative homomorphic operation. Later the encrypted data is send to Cloud Service Provider (CSP) to store in the Cloud Storage Server [12,13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although these services are centralized in data centers, they pose important challenges for service providers . With the rapid growth of the clients' demands, the operator is required to respond accordingly by considering additional servers, network components, high quality of service, and secure architecture abiding by the standards. This generally comes first at the cost of non‐negligible effort in facing new challenges appearing within the core network where SDN leads and governs.…”
Section: Introductionmentioning
confidence: 99%