724
Views
5
CrossRef citations to date
0
Altmetric
Computers and Computing

A Comparative Review on Homomorphic Encryption for Cloud Security

ORCID Icon & ORCID Icon
 

Abstract

With the increase in traffic on cloud servers due to the shifting of various services, information security has become a matter of major concern. This paper describes the security issues influencing cloud computing, compares the performance of traditional and the latest security techniques, and focuses on the challenges facing its implementation. Traditional schemes like RSA, ElGamal, and Pailler Algorithms do not allow operations to be carried out on the encrypted data, whereas the Homomorphic Encryption Scheme allows computation in the encrypted state without decrypting it to the original form. Thus, the security is ensured and also, there is no need to share the secured key. Fully Homomorphic Encryption Algorithms like: Gentry’s Encryption Scheme, Dijk-Gentry-Halevi-Vaikunthanathan Scheme (DGHV), Brakerski-Vaikuntanathan Schemes (BGV) and Multi-key fully Homomorphic encryption are advanced techniques that provide security for the cloud are also described.

Additional information

Notes on contributors

Ganesh Kumar Mahato

Ganesh Kumar Mahato is a research scholar in the Department of Computer Science and Engineering at National Institute of Technology, Arunachal Pradesh, India. His area of interest includes quantum cryptography, cloud security, multi-key homomorphic encryption techniques etc.

Swarnendu Kumar Chakraborty

Swarnendu Kumar Chakraborty is an assistant professor in the Department of Computer Science and Engineering at National Institute of Technology, Arunachal Pradesh, India. He has more than 9 years of teaching experience and has been guiding PG and PhD scholars since 2016. He is an author of more than 40 peer-reviewed publications. His area of research includes advanced error control, cryptography, network and information security etc. Email: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.