To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

Abstract

The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key management, key storage and data aggregation. To solve the problem of key management and key sharing various schemes are proposed in last few years. The third party auditor is the scheme for key management and key sharing. The third party auditor scheme will be failed if the third party’s security is compromised or third party will be malicious. Cloud computing is very latest technology which is widely used in these days. There are some security threats in this network. The proposed scheme is used to provide security to the cloud so that attacker will unable to hack the information using Diffie- Hellman key exchange protocol. . In Diffie -Hellman algorithm, there is no provision for the storage or exchange of the PIN key. So it protects network devices from attacks.

Authors and Affiliations

Preeti Ahuja

Keywords

Related Articles

Experimental Study on the Hardened Properties of Concrete by Using Soft Drink Bottle Caps as Partial Replacement for Coarse Aggregates

Cement concrete is the most extensively used construction material in the world because of its great workability and can be moulded to any shape. Ordinary cement concrete possesses a very low tensile strength, limited du...

Security Model to Secure legacy OPC Server and Client Communication

Steel Authority Of India Limited (SAIL) is the leading steel making company in India. SAIL has its own private network connecting different production units located at Durgapur, Bokaro, Bhilai, Rourkela steel plants etc...

EMF- MHCRF: Enhanced Median Filter (EMF) Based Noise Removal and Multilayer Hidden Conditional Random Field (MHCRF) Model for Dense Depth Map Reconstruction

Depth map reconstruction also named as disparity estimation and it becomes very difficult task in computer vision three dimensional (3D) tasks which has been studied used for more than three decades. Present high quality...

Failure Diagnosis of Spur Gear in Two Stage Planetary Gear Box of Bagasse Carrier Machine used in Sugar Industry by Using FEA

In this paper we have selected agearbox of bagasse carrier machine which is used in sugar industry. In sugar industry, For feeding bagasse to boiler as well as to carry crushed bagasse coming from sugar mill, bagasse car...

Wireless Multimedia Sensor Network: A Review

Wireless Sensor Network (WSN) is emerging field of research for multimedia communication. A wireless sensor network (WSN) is a network of spatially distributed devices using sensors in a dense manner. This network monito...

Download PDF file
  • EP ID EP220596
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Preeti Ahuja (2014). To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing. International journal of Emerging Trends in Science and Technology, 1(6), 939-944. https://europub.co.uk/articles/-A-220596