Towards Secure the Multi-Cloud using Homomorphic Encryption Scheme

نویسنده

  • Suresh Babu
چکیده

Cloud computing is a model to acces shared pool of configurable computing resources which include servers, storage, applications, and also services to network effort or service interaction provider . This cloud model promotes availability and is composed of five essential fetures, in that service models are three, and four are deployment models. However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and legal in reality economic, quality service, interoperability to exchange, security and privacy issues still pose significant challenges. we describe various service and deployment models of cloud computing and identify grater important challenges. In specific, we examine three crucial challenges: regulatory, security and privacy issues in Multi cloud computing. We use AES scheme for encryption of the data. As with any MAC (Medium Access Control), it is used to simultaneously verify both the data integrity and the authentication of a message. Erasure coding is used for rebuilding lost encoded fragments from existing encoded fragments. Objective-The scope of our project is it’s provides a survey on the achievable security merits by making use of multiple distinct clouds simultaneously. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects KeywordsCloud, Security, Privacy, Multiple clouds, Application Partitioning, Tier Partitioning, Data Partitioning, Multi-party Computation,encapsulation, Polymorphism.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Symmetric Somewhat Homomorphic Encryption over the Integers

We describe a symmetric variant of homomomorphic encryption scheme by van Dijk et al. [DGHV10], semantically secure under the error-free approximate-GCD problem. We also provide the implementation of the scheme as a C/C++ library. The scheme allows to perform “mixed” homomorphic operations on ciphertexts and plaintexts, eliminating the need to encrypt new ciphertexts using the public key for so...

متن کامل

“Doctor of Philosophy”

The recent transition to “cloud computing” is changing the way people store and use digital data. Data is more often stored remotely (on a cloud server) and accessed by very weak devices over the internet (e.g. smartphones). In addition to storage, the cloud is expected to manipulate and process the data per the user’s requests, since local processing on the end user’s device is infeasible. Thi...

متن کامل

Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing

With the rapid growth of cloud computing, many users store their data and application on the cloud. However, the growth of cloud computing is slowed down by cloud security problem. Hence, cloud computing security becomes the current research focus. To secure the cloud data, encryption is used. Traditional encryption schemes cannot make cloud computing fully safe. Therefore, Fully homomorphic en...

متن کامل

Secure Data Retrieval Scheme in Cloud Computing Using Homomorphic Cryptographic Approach

Homomorphic encryption technology can settle a dispute of data privacy security in cloud environment, but there are many problems in the process of access the data which is encrypted by a homomorphic algorithm in the cloud. In this paper, on the premise of attribute encryption, we propose a fully homomorphic encrypt scheme which based on attribute encryption with LSSS matrix. This scheme suppor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014