Survey on Securing IoT Data using Homomorphic Encryption Scheme

نویسندگان

چکیده

In today’s world everyone is using cloud services. Every user uploads his/her sensitive data on in encrypted form. If wants to perform any type of computation data, has share credentials with administrator. Which puts privacy risk. does not provider, download all and only then decryption process can be performed. This research, focuses ECC based homomorphic encryption scheme good by considering communication computational cost. Many schemes are presented provide privacy. Analysis different approaches been done selecting common parameters. Based the analysis minimum time 0.25 Second required for (HE).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Data in Cloud Using Homomorphic Encryption

Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentica...

متن کامل

Homomorphic Encryption Techniques for securing Data in Cloud Computing: A Survey

Cloud computing is an arising computational model, where data and its several services associated with its scalable data centers in the cloud and can be obtained from the Internet. Computing gives an added amount of risk as vital services which are usually deployed to any third party, which creates the difficulty to enable data security, privacy factor, confidentiality, integrity, and authentic...

متن کامل

Processing Encrypted Data Using Homomorphic Encryption

Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work. First a scheme is constructed which can ev...

متن کامل

Towards Secure the Multi-Cloud using Homomorphic Encryption Scheme

Cloud computing is a model to acces shared pool of configurable computing resources which include servers, storage, applications, and also services to network effort or service interaction provider . This cloud model promotes availability and is composed of five essential fetures, in that service models are three, and four are deployment models. However, as the shape of the cloud computing is e...

متن کامل

Secure Data Storage on the Cloud using Homomorphic Encryption

Organizations are showing great interest in storing data on public clouds. This could be a result of the unprecedented growth of data recorded in the last few years. However the security issues associated with data storage over cloud is a major discouraging factor for potential adopters. Hence the focus of today is to find cryptographic techniques that will offer more than confidentiality. Homo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of engineering and advanced technology

سال: 2021

ISSN: ['2249-8958']

DOI: https://doi.org/10.35940/ijeat.d2333.0410421