Open Access
Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption
TLDR
The security issues affecting cloud computing are presented and the use of homomorphic encryption as a panacea for dealing with these serious security concerns vis-a-vis the access to cloud data is proposed.Abstract:
The prominence of the place of cloud computing in future converged networks is incontestable. This is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal hardware requirements on
the user end. Secure delivery of data to and from the cloud is however a serious issue that needs to be addressed. We present in this paper the security issues affecting cloud computing and propose the use of homomorphic encryption as a panacea for dealing with these serious security concerns vis-a-vis the access to cloud data.read more
Citations
More filters
Journal ArticleDOI
Multi-Objective Evolutionary Federated Learning
Hangyu Zhu,Yaochu Jin +1 more
TL;DR: Experimental results indicate that the proposed optimization method is able to find optimized neural network models that can not only significantly reduce communication costs but also improve the learning performance of federated learning compared with the standard fully connected neural networks.
Journal ArticleDOI
Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective
TL;DR: A key benefit of connecting edge and cloud computing is the capability to achieve high-throughput under high concurrent accesses, mobility support, real-time processing guarantees, and data persistency.
Journal ArticleDOI
Cloud computing and security issues in the cloud
TL;DR: A review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure is presented.
Journal ArticleDOI
Big data analytics and big data science: a survey
TL;DR: Diverse new approaches, methods, frameworks and systems are proposed for data collection, storage, transport, processing and analysis in the selected papers in a systematic and extensive review of journal publications about big data from 2011 to 2015.
Journal ArticleDOI
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions
TL;DR: Critical security and privacy challenges in cloud computing are surveyed, diverse existing solutions are categorized, their strengths and limitations are compared, and future research directions are envisioned.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
A public key cryptosystem and a signature scheme based on discrete logarithms
TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal Article
Above the Clouds: A Berkeley View of Cloud Computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.
Proceedings ArticleDOI
Fully homomorphic encryption using ideal lattices
TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.