scispace - formally typeset
Open Access

Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption

TLDR
The security issues affecting cloud computing are presented and the use of homomorphic encryption as a panacea for dealing with these serious security concerns vis-a-vis the access to cloud data is proposed.
Abstract
The prominence of the place of cloud computing in future converged networks is incontestable. This is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal hardware requirements on the user end. Secure delivery of data to and from the cloud is however a serious issue that needs to be addressed. We present in this paper the security issues affecting cloud computing and propose the use of homomorphic encryption as a panacea for dealing with these serious security concerns vis-a-vis the access to cloud data.

read more

Citations
More filters
Journal ArticleDOI

Multi-Objective Evolutionary Federated Learning

TL;DR: Experimental results indicate that the proposed optimization method is able to find optimized neural network models that can not only significantly reduce communication costs but also improve the learning performance of federated learning compared with the standard fully connected neural networks.
Journal ArticleDOI

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective

TL;DR: A key benefit of connecting edge and cloud computing is the capability to achieve high-throughput under high concurrent accesses, mobility support, real-time processing guarantees, and data persistency.
Journal ArticleDOI

Cloud computing and security issues in the cloud

TL;DR: A review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure is presented.
Journal ArticleDOI

Big data analytics and big data science: a survey

TL;DR: Diverse new approaches, methods, frameworks and systems are proposed for data collection, storage, transport, processing and analysis in the selected papers in a systematic and extensive review of journal publications about big data from 2011 to 2015.
Journal ArticleDOI

A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions

TL;DR: Critical security and privacy challenges in cloud computing are surveyed, diverse existing solutions are categorized, their strengths and limitations are compared, and future research directions are envisioned.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal Article

Above the Clouds: A Berkeley View of Cloud Computing

TL;DR: This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.