References
- Market Data Forecast, Cloud Storage Market Size & Growth (2020–2025), 2020. Available: https://www.marketdataforecast.com/market-reports/cloud-storage-market.
- P. Manupriya, S. Sinha, and K. Kumar. “V⊕SEE: Video secret sharing encryption technique,” in Proc. Conference on Information and Communication Technology (CICT), 2017, pp. 1–6.
- S. Sharma, and K. Kumar, “Genetic uses in video encryptionwith secret sharing," in Proc. 2nd International Conference on Computer Vision & Image Processing, Roorkee, 2018, pp. 51–62.
- M. M. Potey, C. A. Dhote, and D. H. Sharma. “Homomorphic encryption for security of cloud data,” in Proc. 7th International Conference on Communication, Computing and Virtualization, 2016, pp. 175–181.
- K. K. Chauhan, and A. K. S. Sanger. “Homomorphic encryption for data security in cloud computing,” in Proc. International Conference on Information Technology (ICIT), Bhubaneswar India, 2015, pp. 206–209.
- K. Kumar, and M. Kurhekar. “Sentimentalizer: docker container utility over Cloud,” in Proc. 9th International Conference on Advances in Pattern Recognition (ICAPR), 2017, pp. 1–6.
- K. Kumar, and M. Kurhekar. “Economically efficient virtualization over cloud using Docker containers,” in Proc. IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 2016, pp. 95–100.
- K. Kumar, “Text query based summarized event searching interface system using deep learning over cloud,” Multimed. Tools. Appl., Vol. 80, pp. 11079–11094, 2021.
- S. Sharma, K. Kumar, and N. Singh, “Deep eigen space based ASL recognition system,” IETE J. Res., 2020. DOI: 10.1080/03772063.2020.1780164.
- I. Jabbar, and S. Najim, “Using Fully homomorphic encryption to secure cloud computing,” Sci. PG Trans. Internet Things Cloud Comput., Vol. 4, no. 2, pp. 13–18, 2016.
- K. Hariss, H. Noura, and A. E. Samhat, “An efficient fully homomorphic symmetric encryption algorithm,” Springer Trans. Multimedia Tools Appl., Vol. 79, pp. 12139–12164, Jan. 2020.
- F. Armknecht, and C. Boyd. A guide to fully homomorphic encryption, 2015. Available: https://eprint.iacr.org/2015/1192.
- F. Zhao, C. Li, and C. Feng. “A cloud computing security solution based on fully homomorphic encryption,” in Proc. 16th International Conference on Advanced Communication Technology, Korea (South), 2014, pp. 485–488.
- R. Krishna, and K. Kumar. “P-MEC: polynomial congruence based Multimedia Encryption technique over Cloud,” in IEEE Consumer Electronics Magazine, 2020. doi: 10.1109/MCE.2020.3003127.
- Y. Alkady, F. Farouk, and R. Rizk. “Fully homomorphic encryption with AES in cloud computing security” in Proc. International Conference on Advanced Intelligent Systems and Informatics. Springer Nature Switzerland, 2019, pp. 370–382.
- D. Das. “Secure cloud computing algorithm using homomorphic encryption and multi-party computation,” in Proc. IEEE International Conference on Information Networking, Chiang Mai, Thailand, 2018, pp. 391–396.
- M. Zhao E, and Y. Geng. “Homomorphic encryption technology for cloud computing,” in Proc. 8th International Congress of Information and Communication Technology, 2019, pp. 73–83.
- M. Martinaa, E. Ponmani, G. Bagyalakshmi, and S. Anantha Krishnan, “Enhanced homomorphic encryption technique in cloud computing,” Int. J. Pure. Appl. Math., Vol. 117, no. 15, pp. 675–681, 2017.
- R. Hayward, and C. C. Chiang. “Parallelizing fully homomorphic encryption” in Proc. International Symposium on Computer, Consumer and Control, Taichung, Taiwan, 2014, pp. 721–724.
- A. Bouti, and J. Keller. “Towards practical homomorphic encryption in cloud computing”, in Proc. 4th Symposium on Network Cloud Computing and Applications, Munich, Germany, 2015, pp. 67–74.
- D. Hrestak, and S. Picek. “Homomorphic encryption in the cloud” in Proc. 37th International Convention on Information and Communication Technology, Electronics and Microelectronics, Opatija, Croatia, 2014, pp. 1400–1404.
- C. Gentry. “A fully homomorphic encryption scheme”, Ph.D. dissertation, Stanford University, California, Sep 2009.
- I. Ahmad, and A. Khandekar, “Homomorphic Encryption method applied to cloud computing,” Int. J. Inform. Comput. Technol., Vol. 4, no. 15, pp. 1519–1530, 2014.
- A. El-yahyaoui, and M. D. Ech-Cherif El Kettani. “A verifiable fully homomorphic encryption scheme for cloud computing security,” MDPI Technologies, Switzerland, Feb. 2019, pp. 1–15.
- K. Gai, M. Qiu, Y. Li, and X.-Y. Liu. “Advanced fully homomorphic encryption scheme over real numbers” in Proc. 4th International Conference on Cyber Security and Cloud Computing, New York, USA, 2017, pp. 64–69.
- J. Li, D. Song, S. Chen, and X. Lu. “A simple fully homomorphic encryption scheme available in cloud computing” in Proc. 2nd International Conference on Cloud Computing and Intelligence Systems, Hangzhou, China, 2012, pp. 214–217.
- L. Wang. “Research on full homomorphic encryption algorithm for integer in cloud environment,” in Proc. 15th International Conference on Intelligent Computing, Nanchang, China, 2019, pp. 109–117.
- I. Jabbar, and S. Najim, “Using Fully Homomorphic Encryption to Secure Cloud computing,” Sci. PG Trans. Internet Things Cloud Comput., Vol. 4, no. 2, pp. 13–18, April 2016.