Author : Sapna 1
Date of Publication :18th May 2018
Abstract: The cloud computing is the architecture in which no central controller is present due to which various breaches occurred in the network. To secure data transmission from source to destination two type of encryption schemes. i.e: fully homomorphism and full disk encryption are introduced. The fully homomorphic encryption scheme is more security and light as compared to full disk encryption. In the paper, improvement in the fully homomorphic encryption is proposed using elliptic curve cryptography and OTP generation.
Reference :
-
- Deepanchakaravarthi Purushothaman1 and Dr.Sunitha Abburu2 ,2012” An Approach for Data Storage Security in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1
- Dr Nashaat el-Khameesy,Hossam Abdel Rahman, 2012 “A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems” vol-3
- John Harauz ,Lori M. Kaufman,Bruce Potter,” Data Security in the World of Cloud Computing ” IEEE Security and Privacy July 2009. pp. 61-64
- Sean Carlin, Kevin Curran, 2011 “Cloud Computing Security” International Journal of Ambient Computing and Intelligence, pp 14-19
- Van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V (2010) Fully homomorphic encryption over the integers. In Gilbert, H., ed.: EUROCRYPT. Volume 6110 of Lecture Notes in Computer Science., Springer
- Vimmi Pandey, 2013 “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4
- Bhavna Makhija, VinitKumar Gupta, 2013 “Enhanced Data Security in Cloud Computing with Third Party Auditor”, International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345
- Vimmi Pandey, 2013 “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4
- Sanjoli Singla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
- Ankur Mishra, Ruchita Mathur, Shishir Jain, Jitendra Singh Rathore, 2013 “Cloud Computing Security” International Journal on Recent and Innovation Trends in Computing and Computation, pp 36-39
- Punithasurya K, Esther Daniel, Dr. N. A. Vasanthi, 2013 “A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013, pp 942-946
- Dian-Yuan Han, Feng-qing Zhang, 2012 “Applying Agents to the Data Security in Cloud Computing” International Conference on Computer Science and Information Processing(CSIP), pp 1126-1128