Cloud Security based on the Homomorphic Encryption
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.
Authors and Affiliations
Waleed T. Al-Sit, Qussay Al-Jubouri, Hani Al-Zoubi
Strategic Planning towards Automation of Fiber To The Home (FTTH) Considering Optic Access Network (OAN) Model
With the intention to meet the increasing demand of future higher bandwidth applications, fiber based Gigabit Passive Optical Network (GPON) access is considered best resolution to deliver triple play services (voice, da...
Pause Time Optimal Setting for AODV Protocol on RPGM Mobility Model in MANETs
For the last few years, a number of routing protocols have been proposed and implemented for wireless mobile Ad hoc network. The motivation behind this paper is to discover and study the pause time effects on Ad hoc on D...
The Coin Passcode: A Shoulder-Surfing Proof Graphical Password Authentication Model for Mobile Devices
Swiftness, simplicity, and security is crucial for mobile device authentication. Currently, most mobile devices are protected by a six pin numerical passcode authentication layer which is extremely vulnerable to Shoulder...
Social Computing: The Impact on Cultural Behavior
Social computing continues to become more and more popular and has impacted cultural behavior. While cultural behavior affects the way an individual do social computing, Hofstedeās theory is still prevalent. The results...
AdviseMe: An Intelligent Web-Based Application for Academic Advising
The traditional academic advising process in many tertiary-level institutions today possess significant inefficiencies, which often account for high levels of student dissatisfaction. Common issues include high student-a...