Homomorphic Encryption Algorithms and Schemes for Secure Computations in the Cloud

Homomorphic Encryption Algorithms and Schemes for Secure Computations in the Cloud

1.      Introduction

Given the heightened application of public cloud and internet in data warehousing, security is paramount in ensuring confidentiality and integrity of data as well as the accessibility of the information system resources.[1] Cloud computing, which entails provision of applications offered by third parties such as Microsoft,  allows IT managers to deliver services in a cost-effective and convenient manner.[2]Through Cloud Service Provider (CSP), a user can store data into a package of cloud servers that enhances interaction. Despite the efficiency and economic advantages associated withcloud computing, this technology faces security risks from two main sources: CPS and potential hackers.[3]Once encrypted data is opened for computations, it cannot be processed safely within the cloud and this presents a major cloud computing constraint.[4]Moreover, protection of information while guaranteeing its accessibility pr

WE WRITE PAPERS FOR STUDENTS

Tell us about your assignment and we will find the best writer for your project.

Write My Essay For Me

[1]Parmar, Payal V., Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, and Rutvij H. Jhaveri.”Survey of Various Homomorphic Encryption Algorithms and Schemes.” International Journal of Computer Applications 91, no. 8 (April 2014), 1.

[2]Kanagavalli, R., and S. Vagdevi.”A Survey of Homomorphic Encryption Schemes in Cloud Data Storage.” International Journal of Recent Development in Engineering and Technology 3, no. 1 (July 2014). www.ijrdet.com, 2.

[3]TEBAA, Maha, Saïd EL HAJJI, and Abdellatif EL GHAZI. “Homomorphic Encryption Applied to the Cloud Computing Security.” Proceedings of the World Congress on Engineering I (July 4-6, 2012), 3

[4]El Makkaoui, Khalid, Abdellah Ezzati, Abderrahim Beni-Hssane, and Cina Motamed.”Data Confidentiality in the World of Cloud.” Journal of Theoretical and Applied Information Technology 84, no. 3 (February 29, 2016), 4…

BEST-ESSAY-WRITERS-ONLINE

Order Original and Plagiarism-free Papers Written from Scratch:

PLACE YOUR ORDER