A GENERAL STUDY OF HOMOMORPHIC ENCRYPTION ALOGORITHM WITH CLOUD COMPUTING

Authors

  • V.Sangeetha, V.Jaganraja T.Gnanaprakasam Author

Abstract

In Cloud computing, instead of all the computer hardware and software we are using our desktop, or somewhere inside our company's network, it's provided as a service by another company and accessed through the internet, usually in a completely consistent way. It gives various benefits to users but the fact most of users consider is their data security. Security is the most prioritized aspect for any form of computing, the obvious expectation that security issues are very crucial for cloud environment. As the cloud computing approach could be associated with having users data stored at both clients end as well as in cloud servers, identity management and authentication are very crucial in cloud computing. This paper shows how we secure the cloud security, privacy and reliability when an unauthorized is processing sensitive data. In this paper, we have discussed security risks and concerns in cloud computing and instructed steps that an enterprise can take to reduce security risks and protect their resources and about the study of homomorphic encryption algorithm.

Downloads

Published

2016-03-12

Issue

Section

Articles

How to Cite

A GENERAL STUDY OF HOMOMORPHIC ENCRYPTION ALOGORITHM WITH CLOUD COMPUTING. (2016). Global Journal of Advanced Engineering Technologies and Sciences, 3(3), 11-15. https://gjaets.com/index.php/gjaets/article/view/185

Most read articles by the same author(s)

<< < 20 21 22 23 24 25 26 27 28 29 > >>