JOURNAL ARTICLE

SECURING DATA USING FULLY HOMOMORPHIC ENCRYPTION SCHEMES OVER CLOUD COMPUTING

V. Satish KumarV.Trilik Kumar

Year: 2014 Journal:   Zenodo (CERN European Organization for Nuclear Research) Vol: 3 (10)   Publisher: European Organization for Nuclear Research

Abstract

There is a problem for business organizations to move towards cloud computing regarding the safety and security issues associated with cloud computing. Different technologies have been used to relate these types of issues including various control methods and cryptographic techniques. When the data transmitted to the Cloud we use standard encryption methods to secure the operations and the storage of the data. Fully homomorphic encryption has cloud computing is to perform computations on encrypted data without previous decryption. The first fully homomorphic schemes have been proposed and developed to improve the performance, reduce the complexity and the cost of the scheme. Mainly two important schemes are refreshed and discussed in this paper. The first scheme discoursed in this paper is “Encryption over Integers using fully Homomorphism”. The second one is about “Encryption without Bootstrapping by using fully Homomorphism”. These two are basically concentrated on the security, performance and complexity factors of the mentioned schemes.

Keywords:
Homomorphic encryption Computer science Cloud computing Encryption Homomorphism Client-side encryption Homomorphic secret sharing Cryptography On-the-fly encryption Scheme (mathematics) 56-bit encryption Computer security Theoretical computer science Distributed computing Secure multi-party computation Mathematics Operating system

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.30
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Coding theory and cryptography
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.