Abstract-Distributed computing is a figuring worldview, where a huge pool of frameworks are associated in private or open systems, to give powerfully versatile foundation to application, information and record stockpiling. With the approach of this innovation, the cost of calculation, application facilitating, content stockpiling and conveyance is decreased fundamentally. Distributed computing offers various advantages and administrations yet now a day's security is the greatest test for association which are moving towards the distributed computing. An amazing approach to mitigate these security concerns is to store all information in the cloud scrambled, and perform calculations on encoded information. We require an encryption plan that permits important calculation on scrambled information, in particular a homomorphic encryption conspire.I. INTRODUCTION Distributed computing has developed as a critical worldview that has pulled in impressive consideration in both industry and the scholarly community. Distributed computing as of now existed under various names like "outsourcing" and "server facilitating." With the coming of this innovation, the cost of calculation, application facilitating, content stockpiling and conveyance is diminished essentially. Distributed computing offers various advantages and administrations yet security is the greatest test for association which are moving towards the distributed computing. This paper presents an approach that homomorphic encryption comparing to cloud security. Homomorphic Encryption frameworks are utilized to perform operations on encoded information without knowing the private key (without unscrambling), the customer is the main holder of the mystery key. When we unscramble the consequence of any operation, it is the same as though we had completed the figuring on the crude information.
II. CLOUD COMPUTINGBy definition distributed computing implies it is the Information Technology (IT) show for processing, which is made out of all the IT segments (equipment, programming, systems administration, and administrations) that are important to empower improvement and conveyance of cloud administrations through the Internet or a private system. Asset partaking in an immaculate attachment and play display that significantly rearranges framework arranging is the guarantee of "cloud computing". The two key focal points of this model are usability and cost-adequacy. This definition doesn't specify any security thought of the information put away in the Cloud Computing. Along these lines we comprehend that the Cloud Computing is inadequate with regards to security, classification and perceivability.