2021
DOI: 10.12928/telkomnika.v19i4.16875
|View full text |Cite
|
Sign up to set email alerts
|

From cloud computing security towards homomorphic encryption: A comprehensive review

Abstract: Cloud computing" is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This arti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…The confidentiality of the information being communicated or stored is helped by encryption, which transforms plaintext into an unintelligible format (ciphertext). Encryption can offer additional security advantages in addition to confidentiality, including digital signatures, authentication, and secret key management [3]. To guarantee the information's confidentiality, integrity, and availability, encryption techniques are used.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The confidentiality of the information being communicated or stored is helped by encryption, which transforms plaintext into an unintelligible format (ciphertext). Encryption can offer additional security advantages in addition to confidentiality, including digital signatures, authentication, and secret key management [3]. To guarantee the information's confidentiality, integrity, and availability, encryption techniques are used.…”
Section: Literature Reviewmentioning
confidence: 99%
“…When information is transferred through the internet or another medium, it is commonly referred to as the study of secrets. It is the technique of concealing data in ciphertext, a non-readable format, to prevent unauthorized access [3]. The message can only be translated into plaintext by those who have access to a secret key.…”
Section: A Overview Of Cryptographic Encryption Algorithmsmentioning
confidence: 99%
“…Homomorphic encryption is a collection of conceptually safe encryption techniques that allow mathematical operations to be done directly on the ciphertext rather than the plaintext [5]. HE techniques were categorized into: Partially homomorphic encryption (PHE): In such a technique, it is limited to performing a single mathematical operation (adding or multiplying) on the encoded data at a time, as in Pailler (additive HE) and RSA (multiplicative HE) [6].…”
Section: Related Workmentioning
confidence: 99%
“…Only one announce about Deep learning algorithm to prevent malware activities [14]. (Mohammed & Taha, 2021) presented a proximate comprehensive study about homomorphic encryption to enhance the security and privacy of the cloud computing. No deep learning had been listed among the study papers [15].…”
Section: The Related Workmentioning
confidence: 99%
“…They had listed the common clouds and the security methods, they are (blockchain, Deep Learning and Cryptography. Limited information had been reviewed for the deep learning papers with limited criteria [16].…”
Section: The Related Workmentioning
confidence: 99%