Research Article
CryptoSecurity: Applying Homomorphic Security Schemes to Encrypted Data in Cloud Computing
@INPROCEEDINGS{10.4108/eai.27-2-2020.2303142, author={Deepika Bhatia and Meenu Dave}, title={CryptoSecurity: Applying Homomorphic Security Schemes to Encrypted Data in Cloud Computing}, proceedings={Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27-28 February 2020, Jamia Hamdard, New Delhi, India}, publisher={EAI}, proceedings_a={ICIDSSD}, year={2021}, month={3}, keywords={cloud homomorphic security encryption asymmetric elliptic curve cryptography}, doi={10.4108/eai.27-2-2020.2303142} }
- Deepika Bhatia
Meenu Dave
Year: 2021
CryptoSecurity: Applying Homomorphic Security Schemes to Encrypted Data in Cloud Computing
ICIDSSD
EAI
DOI: 10.4108/eai.27-2-2020.2303142
Abstract
Cloud computing is a platform which can be used for data storage and processing. Users can outsource their data to cloud environment where various operations can be performed on this data. As the data is private, different concerns are there for security and privacy of user’s data over the distributed network. Nowadays, data security is a major concern in higher education. Various techniques are available for mobile devices and used in IOT. Major issue is of data communication arises while using such kind of devices. So the concern arises over the security of data during transfer using public environment. Size and power level available in these small handheld devices is also a major challenge. Mobile environment also creates a big concern over the security of user’s data. The paper focuses on various challenges, issues and various technologies available to secure user’s data. This paper presents a comparative analysis of various homomorphic encryption techniques. The paper presents the analysis of various homomorphic encryption algorithms such as RSA, ElGamal, Paillier, enhanced homomorphic encryption scheme, AHEE, BGV etc. Comparative study of these public key cryptographic techniques is presented in this paper and also it is shown that ECC method is extensively used nowadays by various Governments as it is more secured while exchanging the information in cloud environment. It can also be improved in future scenarios.