97
Views
0
CrossRef citations to date
0
Altmetric
Articles

Secure storage and accessing the data in cloud using optimized homomorphic encryption

, &
Pages 90-98 | Received 05 Jan 2022, Accepted 12 May 2022, Published online: 29 May 2022

References

  • Asaad, R. R., & Abdulnabi, N. L. (2018). Using local searches algorithms with Ant colony optimization for the solution of TSP problems. Academic Journal of Nawroz University, 7(3), 1–6. https://doi.org/10.25007/ajnu.v7n3a193
  • Barolli, L., Xhafa, F., & Conesa, J. (2017). Advances on broad-band wireless computing, Communication and applications. Springer.
  • Chibani, S. S., & Tari, A. (2017). Elephant herding optimization for service selection in qos-aware web service composition. Int. J. Comput. Electr. Autom. Control Inf. Eng, 11(10), 1063–1067.https://doi.org/10.5281/zenodo.1132309
  • Joshi, M., Joshi, K., & Finin, T. (2018, July 2–7). Attribute based encryption for secure access to cloud based EHR systems. 2018 IEEE 11th International Conference on cloud computing (CLOUD) (pp. 932–935). IEEE.
  • Mahendiran, N. S., & Sairam, N. (2012). A review on leaders in cloud computing service providers and cloud SQL a case study. Res. J. Appl. Sci. Eng. Technol, 4(17), 2926–2933.
  • Pavani, V., Krishna, P. S., Gopi, A. P., & Narayana, V. L. (2020). Secure data storage and accessing in cloud computing using enhanced group-based cryptography mechanism. Materials Today: Proceedings.
  • Prabha, K. M., & Saraswathi, P. V. (2020). Suppressed K-anonymity multi-factor authentication based schmidt-Samoa cryptography for privacy preserved data access in cloud computing. Computer Communications, 158, 85–94. https://doi.org/10.1016/j.comcom.2020.04.057
  • Rajathi, A., & Saravanan, N. (2013). A survey on secure storage in cloud computing Indian. Journal of Science and Technology, 6(4), 4396–4401. https://doi.org/10.17485/ijst/2013/v6i4.24
  • Sandra Durcevic. (2020). “Cloud Computing Risks, Challenges & Problems Businesses Are Facing,” Business Intelligence, 2019. [Online]. Available: https://www.datapine.com/blog/cloud-computing-risks-and-challenges/. [Accessed: 22-Feb2020].
  • Sanka, S., Hota, C., & Rajarajan, M. (2010a, December 15–17). Secure data access in cloud computing. 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and application.
  • Sanka, S., Hota, C., & Rajarajan, M. (2010b, December 15–17). Secure data access in cloud computing. 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application.
  • Saravanan, N., & Umamakeswari, D. A. (2020). Lattice based access control for protecting user data in cloud environments with hybrid security. Computers & Security, 100, 102074. https://doi.org/10.1016/j.cose.2020.102074
  • Shah, M. A., Swaminathan, R., & Baker, M. (2008). Privacy-Preserving audit and extraction of digital contents. IACR Cryptol, 1–21. https://eprint.iacr.org/2008/186/20080429:152215
  • Suganthan, P., Hansen, N., Liang, J., Deb, K., Chen, Y., Auger, A., & Tiwari, S. (2005). Problem definitions and evaluation criteria for the CEC 2005 special session on real-parameter optimization. Nanyang Technological University.
  • Suresha, K., Vijayakarthick, P., Dhanasekaran, S., & Murugan, B. S. (2021). Threshold secret sharing and multi-authority-based data access control in cloud computing. Materials Today: Proceedings.
  • Wang, G., Deb, S., & Coelho, L. (2015, December 7–9). Elephant herding optimization. 3rd International Symposium on computational and Business Intelligence (ISCBI), Bali, Indonesia.
  • Wang, G., Deb, S., Zhao, X., & Cui, Z. (2016). A new monarch butterfly optimization with an improved crossover operator. Operational Research, 18(3), 731–755. https://doi.org/10.1007/s12351-016-0251-z
  • Wang, G. G., Coelho, L. D. S., Gao, X. Z., & Deb, S. (2017). A new metaheuristic optimisation algorithm motivated by elephant herding behaviour. International Journal of Bio-Inspired Computation, 8(6), 394–409. https://doi.org/10.1504/IJBIC.2016.081335
  • Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing. In European symposium on research in computer security (Vol. 5789, pp. 355–370). Springer. https://doi.org/10.1007/978-3-642-04444-1_22
  • Wobst, R. (2001). “The Advanced Encryption Standard (AES): The Successor of DES,” 2001.
  • Xue, J., & Zhang, J. J. (2010). “A brief survey on the security model of cloud computing,” in Proceedings - 9th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, DCABES 2010, 2010,.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.