Cloud Security based on the Homomorphic Encryption

Abstract

Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.

Authors and Affiliations

Waleed T. Al-Sit, Qussay Al-Jubouri, Hani Al-Zoubi

Keywords

Related Articles

Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network

To minimize the communication overhead with the help of optimal path selection in Wireless Sensor Network (WSN) routing protocols is the challenging issue. Hierarchical routing optimizes energy utilization by distributin...

Personalized Recommender by Exploiting Domain based Expert for Enhancing Collaborative Filtering Algorithm :PReC

The large amount of information available on the internet initiated various Recommender algorithms to act as an intermediate between number of choices and internet users. Collaborative filtering is one of the most tradi...

A New Reliability Model for Evaluating Trustworthiness of Intelligent Agents in Vertical Handover 

Our previous works have proposed the deployment of mobile agents to assist vertical handover decisions in 4G. Adding a mobile agent in the 4G could lead to many advantages such as reduced consumption of network bandwidth...

First Out First Served Algorithm for Mobile Wireless Sensor Networks

Wireless Sensor Networks (WSNs) have recently gained tremendous attention as they cover a vast range of applications requiring an important number of sensor nodes deployed in the area of interest to measure physiological...

Nearest Neighbor Value Interpolation

 This paper presents the nearest neighbor value (NNV) algorithm for high resolution (H.R.) image interpolation. The difference between the proposed algorithm and conventional nearest neighbor algorithm is that the c...

Download PDF file
  • EP ID EP626664
  • DOI 10.14569/IJACSA.2019.0100838
  • Views 81
  • Downloads 0

How To Cite

Waleed T. Al-Sit, Qussay Al-Jubouri, Hani Al-Zoubi (2019). Cloud Security based on the Homomorphic Encryption. International Journal of Advanced Computer Science & Applications, 10(8), 300-307. https://europub.co.uk/articles/-A-626664