JOURNAL ARTICLE

A SURVEY REPORT ON TECHNIQUES FOR DATA CONFIDENTIALITY IN CLOUD COMPUTING USING HOMOMORPHIC ENCRYPTION

Dhruva Gaidhani

Year: 2017 Journal:   International Journal of Advanced Research in Computer Science Vol: 8 (8)Pages: 389-394   Publisher: International Journal of Advanced Research in Computer Science

Abstract

In order to store information, access content ubiquitously and run processes remotely, without the concern of existing infrastructure, a majority of users have resorted to using Cloud based technology. Cloud computing uses shared pools of configurable resources to provide varying computational capabilities to store and process data. This service is broadly classified into private clouds and third-party operated clouds. Because of the shared nature of this technology, cloud computing poses confidentiality concerns. Important data might be leaked either by the service provider itself, accidentally or intentionally, or by an external attacker who manages to gain unauthorized access. The solution is data encryption. However, encrypting data will make it unusable for computations or processing. Homomorphic Encryption techniques allow encrypted data to be processed like plain text data to give the same output. Thus the service provider will have access to encrypted data and can perform operations on it as well; however, the original data will be unknown. In this paper, we aim to present a survey on homomorphic encryption techniques from different categories and a comparative analysis of their application to maintain data confidentiality in cloud computing.

Keywords:
Computer science Homomorphic encryption Cloud computing Encryption Confidentiality Computer security Client-side encryption Service provider Database Service (business) On-the-fly encryption Operating system Business

Metrics

4
Cited By
0.46
FWCI (Field Weighted Citation Impact)
24
Refs
0.71
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

Ensuring Confidentiality of Cloud Data using Homomorphic Encryption

K. SuveethaT. Manju

Journal:   Indian Journal of Science and Technology Year: 2016 Vol: 9 (8)
JOURNAL ARTICLE

Homomorphic Encryption Techniques for securing Data in Cloud Computing: A Survey

V. BikshamD. Vasumathi

Journal:   International Journal of Computer Applications Year: 2017 Vol: 160 (6)Pages: 1-5
JOURNAL ARTICLE

A SURVEY ON HOMOMORPHIC ENCRYPTION TECHNIQUES IN CLOUD COMPUTING

Journal:   International Journal of Advance Engineering and Research Development Year: 2015 Vol: 4 (02)
JOURNAL ARTICLE

Data Security in Cloud Computing Using Homomorphic encryption

Sumit YadavUsha VermaChhavi Bhardwaj

Journal:   International Journal of Scientific Research Year: 2012 Vol: 3 (5)Pages: 78-81
© 2026 ScienceGate Book Chapters — All rights reserved.