2017 2nd IEEE International Conference on Recent Trends in Electronics, Information &Amp; Communication Technology (RTEICT) 2017
DOI: 10.1109/rteict.2017.8256554
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in cloud computing and its counter measure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Rachna Jain, Sushila Madan,Bindu Garg [1] in 2016, "Homomorphic Framework to Ensure Data Security in Cloud Environment", tells about the cryptographic techniques that can be used as secure storage which can help cloud computing at some extent also focuses on the major disadvantage of secure storage that it cannot perform processing on encrypted data, this problem is sort out using homomorphic encryption as in homomorphic encryption data is stored as cipher text and processing is performed on this cipher text. So there is no risk of data exposure.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Rachna Jain, Sushila Madan,Bindu Garg [1] in 2016, "Homomorphic Framework to Ensure Data Security in Cloud Environment", tells about the cryptographic techniques that can be used as secure storage which can help cloud computing at some extent also focuses on the major disadvantage of secure storage that it cannot perform processing on encrypted data, this problem is sort out using homomorphic encryption as in homomorphic encryption data is stored as cipher text and processing is performed on this cipher text. So there is no risk of data exposure.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The major obstacle over cloud is that confidential data will be used by other enterprises [1]. For that obstacle to overcome or for strengthen the confidentiality of data, we use Homomorphic Encryption technique which is able to perform operation on encrypted data without knowing the secret key, so that data will never be clear neither during transmission nor during processing.…”
Section: Homomorphic Encryption and Its Challenges In Cloud Compumentioning
confidence: 99%
“…Cloud Computing is not a single technology or architecture it is a platform of computing, networking, security, privacy and storage technologies. Millions of people and organizations around the world adopted cloud computing [1].…”
Section: Introductionmentioning
confidence: 99%