2015 International Conference on Information Networking (ICOIN) 2015
DOI: 10.1109/icoin.2015.7057954
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic encryption in mobile multi cloud computing

Abstract: Multi cloud computing has become a new trend for complementing existing cloud computing today. Multi cloud computing is considered safer and more efficient in maintaining data regulation of user(s). The paper discusses the security of mobile multi cloud computing (MMC) and the advantages for mobile user(s), beside that for the data security itself cover with homomorphic encryption which predictable by many researchers as the optimum method for cloud computing environment. The implementation and evaluation of h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…Homomorphic encryption is a form of encryption that allows computation on ciphertext, generating an encrypted result which decrypted, matches the result of the operations as if they had been performed on the plaintext. [8].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Homomorphic encryption is a form of encryption that allows computation on ciphertext, generating an encrypted result which decrypted, matches the result of the operations as if they had been performed on the plaintext. [8].…”
Section: Related Workmentioning
confidence: 99%
“…Data Confidentiality [8] Security of data storage In this framework, homomorphic encryption is used to provide security. Data Confidentiality [9] Block based sharing scheme (BSS) In this technique, security operations of mobile device side include reasonably partitioning data into numerous chunks, apply encryption and decryption and reorganization to make the actual form.…”
Section: Comparative Analysismentioning
confidence: 99%
“…Homomorphic encryption schemes overcome these limitations by allowing a cloud service provider to perform certain computable functions on the encrypted data while preserving the features of the function and format of the encrypted data (Acar et al 2018). Louk and Lim (2015) proposed a homomorphic data security encryption scheme that converted data into ciphertext and manipulated the ciphertext just like the original text without compromising the encryption. There are a variety of different homographic encryption types, for example multiplicative, additive and fully homomorphic, all of which have been applied to secure communication and storage in the cloud (Tebaa and Hajji 2014).…”
Section: Executionmentioning
confidence: 99%
“…In [78], the authors used homomorphic encryption, multicloud computing and mobile. They used multiple cloud schemes for storing the data to avoid data lock in and used homomorphic encryption to run computations without downloading the data back and forth between cloud computing and mobile to avoid the communication costs.…”
Section: B Mobile Cloud Computingmentioning
confidence: 99%