Fully Homomorphic Encryption (Fhe) Scheme For Secure Data Sharing In Cloud Storage

نویسنده

  • Suresh Kumar
چکیده

Cloud computing is an internet based independence, scalability, elasticity, ubiquitous network access, resource pooling and pay Cloud storage is nowadays very popular storage system. Cloud storage is storing of data storage which is maintained by third party. Cloud storage is saving of digital data in logical pool and physical storage spans multiple servers which are manage by third party. Third party is responsible for keeping data available and accessible and physical environment should be protected and running at all time. Instead of storing data to the hard drive or any other local storage, we save data to remote storage which is accessible from anywhere and anytime. It reduces efforts of c can access information from any computer through internet which omitted limitation of accessing information from same computer where it is stored. While considering data privacy, we cannot r unexpected privilege escalation will expose all data. Solution is to encrypt data before uploading to the server with user’s own key. Data sharing is again important functionality of cloud storage, be from anywhere and anytime to anyone. For example, organization may grant permission to access part of sensitive data to their employees. But challengi user can download the encrypted data from storage, decrypt that data and send it to share with others, but it loses the importance of cloud storage. 10(12) July 2016, Pages: 220-223

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes

With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve this goal. However, data encryption at the rest alone is insufficient for secure cloud computation environments. Further efficient techniques for carrying out computation over en...

متن کامل

Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing

With the rapid growth of cloud computing, many users store their data and application on the cloud. However, the growth of cloud computing is slowed down by cloud security problem. Hence, cloud computing security becomes the current research focus. To secure the cloud data, encryption is used. Traditional encryption schemes cannot make cloud computing fully safe. Therefore, Fully homomorphic en...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key manageme...

متن کامل

Efficient fully homomorphic encryption with circularly secure key switching process

Fully homomorphic encryption (FHE) has important applications in cloud computing. However, almost all fully homomorphic encryption schemes share two common flaws that they all use large-scale secret keys and some operations inefficient. In this paper, the “special b” variant of the Learning With Errors problem (bLWE) is presented, and helps us construct the first circularly secure key switching...

متن کامل

Secure Frequent Pattern Mining by Fully Homomorphic Encryption with Ciphertext Packing

We propose an efficient and secure frequent pattern mining protocol with fully homomorphic encryption (FHE). Nowadays, secure outsourcing of mining tasks to the cloud with FHE is gaining attentions. However, FHE execution leads to significant time and space complexities. P3CC, the first proposed secure protocol with FHE for frequent pattern mining, has these particular problems. It generates ci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016