724
Views
5
CrossRef citations to date
0
Altmetric
Computers and Computing

A Comparative Review on Homomorphic Encryption for Cloud Security

ORCID Icon & ORCID Icon

References

  • Market Data Forecast, Cloud Storage Market Size & Growth (2020–2025), 2020. Available: https://www.marketdataforecast.com/market-reports/cloud-storage-market.
  • P. Manupriya, S. Sinha, and K. Kumar. “V⊕SEE: Video secret sharing encryption technique,” in Proc. Conference on Information and Communication Technology (CICT), 2017, pp. 1–6.
  • S. Sharma, and K. Kumar, “Genetic uses in video encryptionwith secret sharing," in Proc. 2nd International Conference on Computer Vision & Image Processing, Roorkee, 2018, pp. 51–62.
  • M. M. Potey, C. A. Dhote, and D. H. Sharma. “Homomorphic encryption for security of cloud data,” in Proc. 7th International Conference on Communication, Computing and Virtualization, 2016, pp. 175–181.
  • K. K. Chauhan, and A. K. S. Sanger. “Homomorphic encryption for data security in cloud computing,” in Proc. International Conference on Information Technology (ICIT), Bhubaneswar India, 2015, pp. 206–209.
  • K. Kumar, and M. Kurhekar. “Sentimentalizer: docker container utility over Cloud,” in Proc. 9th International Conference on Advances in Pattern Recognition (ICAPR), 2017, pp. 1–6.
  • K. Kumar, and M. Kurhekar. “Economically efficient virtualization over cloud using Docker containers,” in Proc. IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 2016, pp. 95–100.
  • K. Kumar, “Text query based summarized event searching interface system using deep learning over cloud,” Multimed. Tools. Appl., Vol. 80, pp. 11079–11094, 2021.
  • S. Sharma, K. Kumar, and N. Singh, “Deep eigen space based ASL recognition system,” IETE J. Res., 2020. DOI: 10.1080/03772063.2020.1780164.
  • I. Jabbar, and S. Najim, “Using Fully homomorphic encryption to secure cloud computing,” Sci. PG Trans. Internet Things Cloud Comput., Vol. 4, no. 2, pp. 13–18, 2016.
  • K. Hariss, H. Noura, and A. E. Samhat, “An efficient fully homomorphic symmetric encryption algorithm,” Springer Trans. Multimedia Tools Appl., Vol. 79, pp. 12139–12164, Jan. 2020.
  • F. Armknecht, and C. Boyd. A guide to fully homomorphic encryption, 2015. Available: https://eprint.iacr.org/2015/1192.
  • F. Zhao, C. Li, and C. Feng. “A cloud computing security solution based on fully homomorphic encryption,” in Proc. 16th International Conference on Advanced Communication Technology, Korea (South), 2014, pp. 485–488.
  • R. Krishna, and K. Kumar. “P-MEC: polynomial congruence based Multimedia Encryption technique over Cloud,” in IEEE Consumer Electronics Magazine, 2020. doi: 10.1109/MCE.2020.3003127.
  • Y. Alkady, F. Farouk, and R. Rizk. “Fully homomorphic encryption with AES in cloud computing security” in Proc. International Conference on Advanced Intelligent Systems and Informatics. Springer Nature Switzerland, 2019, pp. 370–382.
  • D. Das. “Secure cloud computing algorithm using homomorphic encryption and multi-party computation,” in Proc. IEEE International Conference on Information Networking, Chiang Mai, Thailand, 2018, pp. 391–396.
  • M. Zhao E, and Y. Geng. “Homomorphic encryption technology for cloud computing,” in Proc. 8th International Congress of Information and Communication Technology, 2019, pp. 73–83.
  • M. Martinaa, E. Ponmani, G. Bagyalakshmi, and S. Anantha Krishnan, “Enhanced homomorphic encryption technique in cloud computing,” Int. J. Pure. Appl. Math., Vol. 117, no. 15, pp. 675–681, 2017.
  • R. Hayward, and C. C. Chiang. “Parallelizing fully homomorphic encryption” in Proc. International Symposium on Computer, Consumer and Control, Taichung, Taiwan, 2014, pp. 721–724.
  • A. Bouti, and J. Keller. “Towards practical homomorphic encryption in cloud computing”, in Proc. 4th Symposium on Network Cloud Computing and Applications, Munich, Germany, 2015, pp. 67–74.
  • D. Hrestak, and S. Picek. “Homomorphic encryption in the cloud” in Proc. 37th International Convention on Information and Communication Technology, Electronics and Microelectronics, Opatija, Croatia, 2014, pp. 1400–1404.
  • C. Gentry. “A fully homomorphic encryption scheme”, Ph.D. dissertation, Stanford University, California, Sep 2009.
  • I. Ahmad, and A. Khandekar, “Homomorphic Encryption method applied to cloud computing,” Int. J. Inform. Comput. Technol., Vol. 4, no. 15, pp. 1519–1530, 2014.
  • A. El-yahyaoui, and M. D. Ech-Cherif El Kettani. “A verifiable fully homomorphic encryption scheme for cloud computing security,” MDPI Technologies, Switzerland, Feb. 2019, pp. 1–15.
  • K. Gai, M. Qiu, Y. Li, and X.-Y. Liu. “Advanced fully homomorphic encryption scheme over real numbers” in Proc. 4th International Conference on Cyber Security and Cloud Computing, New York, USA, 2017, pp. 64–69.
  • J. Li, D. Song, S. Chen, and X. Lu. “A simple fully homomorphic encryption scheme available in cloud computing” in Proc. 2nd International Conference on Cloud Computing and Intelligence Systems, Hangzhou, China, 2012, pp. 214–217.
  • L. Wang. “Research on full homomorphic encryption algorithm for integer in cloud environment,” in Proc. 15th International Conference on Intelligent Computing, Nanchang, China, 2019, pp. 109–117.
  • I. Jabbar, and S. Najim, “Using Fully Homomorphic Encryption to Secure Cloud computing,” Sci. PG Trans. Internet Things Cloud Comput., Vol. 4, no. 2, pp. 13–18, April 2016.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.