Secure Cloud Computing through Homomorphic Encryption

نویسندگان

  • Maha Tebaa
  • Said El Hajji
چکیده

Go to the cloud, has always been the dream of man. Cloud Computing offers a number of benefits and services to its customers who pay the use of hardware and software resources (servers hosted in data centers, applications, software...) on demand which they can access via internet without the need of expensive computers or a large storage system capacity and without paying any equipment maintenance fees. But these cloud providers must provide guarantees on the protection of privacy and sensitive data stored in their data centers shared between multiple clients using the concept of virtualization.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing

With the rapid growth of cloud computing, many users store their data and application on the cloud. However, the growth of cloud computing is slowed down by cloud security problem. Hence, cloud computing security becomes the current research focus. To secure the cloud data, encryption is used. Traditional encryption schemes cannot make cloud computing fully safe. Therefore, Fully homomorphic en...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption

Secure function evaluation (SFE) is the process of computing a function (or running an algorithm) on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsou...

متن کامل

On the use of homomorphic encryption to secure cloud computing, services, and routing protocols

.......................................................................................................................................... ii Acknowledgements ........................................................................................................................ iii Table of

متن کامل

Symmetric Somewhat Homomorphic Encryption over the Integers

We describe a symmetric variant of homomomorphic encryption scheme by van Dijk et al. [DGHV10], semantically secure under the error-free approximate-GCD problem. We also provide the implementation of the scheme as a C/C++ library. The scheme allows to perform “mixed” homomorphic operations on ciphertexts and plaintexts, eliminating the need to encrypt new ciphertexts using the public key for so...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1409.0829  شماره 

صفحات  -

تاریخ انتشار 2013