Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Intensification of Information safety by Cryptography in Cloud Computing

K.Sivanagalakshmi, R.Anil Kumar, Dr.S.Prem Kumar, ,
Affiliations
M.Tech Research Scholar</br>Assistant Professor</br> Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool JNTU Anatapur, Andhra Pradesh, India
:NOT ASSIGNED


Abstract
Cloud computing security challenges and it’s additionally an issue to numerous analysts; first necessity was to concentrate on security which is the greatest concern of associations that are considering a move to the cloud. The points of interest of Cloud computing incorporate decreased expenses, simple upkeep and re-provisioning of assets, and consequently expanded benefits. Yet the appropriation and the section to the Cloud computing applies just if the security is guaranteed. Instructions to surety a finer information security furthermore in what manner would we be able to keep the customer private data secret? There are two real inquiries that present a test to Cloud computing suppliers. At the point when the information exchanged to the Cloud we utilize standard encryption routines to secure the operations and the stockpiling of the information. Anyhow to process information placed on a remote server, the Cloud suppliers need to get to the basic information. In this paper we are proposing Homomorphic encryption algorithm to execute operations on encoded information without decoding them which will give us the same comes about after computations as though we have worked straightforwardly on the basic information


Citation
K.Sivanagalakshmi,R.Anil Kumar,Dr.S.Prem Kumar."Intensification of Information safety by Cryptography in Cloud Computing". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 02,pp.77-82, August - 2014, URL :https://ijcert.org/ems/ijcert_papers/volume_1_Issue_2_paper_7.pdf,


Keywords : Homomorphic Encryption, Cloud Computing, Cryptography, Information Security

References
[1]Vic (J.R.) Winkler, ”Securing the Cloud, Cloud
Computer Security, Techniques and Tactics”,
Elsevier, 2011.
[2] Pascal Paillier. Public-key cryptosystems based
on composite degree residuosity classes. In 18th
Annual Eurocrypt Conference (EUROCRYPT'99),
Prague, Czech Republic , volume 1592, 1999
[3] Julien Bringe and al. An Application of the
Goldwasser-Micali Cryptosystem to Biometric
Authentication, Springer-Verlag, 2007.
[4] R. Rivest, A. Shamir, and L. Adleman. A method
for obtaining digital signatures and public key
cryptosystems. Communications of the ACM, 21(2)
:120-126, 1978. Computer Science, pages 223-238.
Springer, 1999.
[5] Taher ElGamal. A public key cryptosystem and a
signature scheme based on discrete logarithms. IEEE
Transactions on Information Theory, 469-472, 1985.
[6] Craig Gentry, A Fully Homomorphic Encryption
Scheme, 2009. 


DOI Link : NOT ASSIGNED

Download :
  volume_1_Issue_2_paper_7.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]