A Training on Data Security in Cloud Computing Employing Effusively Homomorphic Encryption Techniques

A Training on Data Security in Cloud Computing Employing Effusively Homomorphic Encryption Techniques

Authors

  • Dr.Udayakumar R., Dr.Kaliyamurthie K.P., Dr.Kavitha R.

Keywords:

cloud computing, Data Security, Encryption, Decryption, Homomorphic Encryption

Abstract

Distributed computing gives a route to the business to deal with the figuring assets on the web. The term has developed over late years, and can be utilized to depict the utilization of an outsider for your capacity and figuring needs. The mechanical improvement of distributed computing has helped the business to develop as well as the wellbeing of information has turned into a noteworthy issue. Numerous encryption procedures are utilized as a part of information security in cloud. They are especially powerful when the information is away state and in transmission state. Be that as it may, in handling state the information must be unscrambled so that the operations can be performed. Once the information is unscrambled it is accessible to the cloud supplier henceforth these customary encryption systems are insufficient to secure the information. The information will be protected if the operations are performed in the decoded information. This can be accomplished if the information is encoded utilizing homomorphic encryption strategies. This paper examines about the homomorphic encryption method, its disadvantages and future improvements.

Published

30-07-2018

Issue

Section

Articles
Loading...