Survey on Securing IoT Data using Homomorphic Encryption Scheme
نویسندگان
چکیده
In today’s world everyone is using cloud services. Every user uploads his/her sensitive data on in encrypted form. If wants to perform any type of computation data, has share credentials with administrator. Which puts privacy risk. does not provider, download all and only then decryption process can be performed. This research, focuses ECC based homomorphic encryption scheme good by considering communication computational cost. Many schemes are presented provide privacy. Analysis different approaches been done selecting common parameters. Based the analysis minimum time 0.25 Second required for (HE).
منابع مشابه
Securing Data in Cloud Using Homomorphic Encryption
Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentica...
متن کاملHomomorphic Encryption Techniques for securing Data in Cloud Computing: A Survey
Cloud computing is an arising computational model, where data and its several services associated with its scalable data centers in the cloud and can be obtained from the Internet. Computing gives an added amount of risk as vital services which are usually deployed to any third party, which creates the difficulty to enable data security, privacy factor, confidentiality, integrity, and authentic...
متن کاملProcessing Encrypted Data Using Homomorphic Encryption
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work. First a scheme is constructed which can ev...
متن کاملTowards Secure the Multi-Cloud using Homomorphic Encryption Scheme
Cloud computing is a model to acces shared pool of configurable computing resources which include servers, storage, applications, and also services to network effort or service interaction provider . This cloud model promotes availability and is composed of five essential fetures, in that service models are three, and four are deployment models. However, as the shape of the cloud computing is e...
متن کاملSecure Data Storage on the Cloud using Homomorphic Encryption
Organizations are showing great interest in storing data on public clouds. This could be a result of the unprecedented growth of data recorded in the last few years. However the security issues associated with data storage over cloud is a major discouraging factor for potential adopters. Hence the focus of today is to find cryptographic techniques that will offer more than confidentiality. Homo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of engineering and advanced technology
سال: 2021
ISSN: ['2249-8958']
DOI: https://doi.org/10.35940/ijeat.d2333.0410421