Loading…

Cloud Security based on the Homomorphic Encryption

Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is h...

Full description

Saved in:
Bibliographic Details
Published in:International journal of advanced computer science & applications 2019, Vol.10 (8)
Main Authors: Al-Sit, Waleed T, Al-Jubouri, Qussay, Al-Zoubi, Hani
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 8
container_start_page
container_title International journal of advanced computer science & applications
container_volume 10
creator Al-Sit, Waleed T
Al-Jubouri, Qussay
Al-Zoubi, Hani
description Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.
doi_str_mv 10.14569/IJACSA.2019.0100838
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2655164722</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2655164722</sourcerecordid><originalsourceid>FETCH-LOGICAL-c274t-585c7ed9a515cd725fa1bd2b4c9caf2a9bbb3db3347fc4e6aaf603ae1cbbba853</originalsourceid><addsrcrecordid>eNotkEtLw0AUhQdRsNT-AxcDrhPnPckyhGorBRdVcDfMKzSlzcSZZNF_b2x6z-IeOId74QPgGaMcMy7K1-1HVe-rnCBc5ggjVNDiDiwI5iLjXKL7qy8yjOTPI1ildETT0JKIgi4AqU9hdHDv7Rjb4QKNTt7B0MHh4OEmnCfF_tBauO5svPRDG7on8NDoU_Kr216C77f1V73Jdp_v27raZZZINmS84FZ6V2qOuXWS8EZj44hhtrS6Ibo0xlBnKGWyscwLrRuBqPbYToEuOF2Cl_luH8Pv6NOgjmGM3fRSEcE5FkwSMrXY3LIxpBR9o_rYnnW8KIzUFZCaAal_QOoGiP4BIHFZgw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2655164722</pqid></control><display><type>article</type><title>Cloud Security based on the Homomorphic Encryption</title><source>Publicly Available Content Database</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Al-Sit, Waleed T ; Al-Jubouri, Qussay ; Al-Zoubi, Hani</creator><creatorcontrib>Al-Sit, Waleed T ; Al-Jubouri, Qussay ; Al-Zoubi, Hani</creatorcontrib><description>Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2019.0100838</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Cloud computing ; Cybersecurity ; Encryption</subject><ispartof>International journal of advanced computer science &amp; applications, 2019, Vol.10 (8)</ispartof><rights>2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2655164722?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,44590</link.rule.ids></links><search><creatorcontrib>Al-Sit, Waleed T</creatorcontrib><creatorcontrib>Al-Jubouri, Qussay</creatorcontrib><creatorcontrib>Al-Zoubi, Hani</creatorcontrib><title>Cloud Security based on the Homomorphic Encryption</title><title>International journal of advanced computer science &amp; applications</title><description>Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.</description><subject>Cloud computing</subject><subject>Cybersecurity</subject><subject>Encryption</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNotkEtLw0AUhQdRsNT-AxcDrhPnPckyhGorBRdVcDfMKzSlzcSZZNF_b2x6z-IeOId74QPgGaMcMy7K1-1HVe-rnCBc5ggjVNDiDiwI5iLjXKL7qy8yjOTPI1ildETT0JKIgi4AqU9hdHDv7Rjb4QKNTt7B0MHh4OEmnCfF_tBauO5svPRDG7on8NDoU_Kr216C77f1V73Jdp_v27raZZZINmS84FZ6V2qOuXWS8EZj44hhtrS6Ibo0xlBnKGWyscwLrRuBqPbYToEuOF2Cl_luH8Pv6NOgjmGM3fRSEcE5FkwSMrXY3LIxpBR9o_rYnnW8KIzUFZCaAal_QOoGiP4BIHFZgw</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Al-Sit, Waleed T</creator><creator>Al-Jubouri, Qussay</creator><creator>Al-Zoubi, Hani</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2019</creationdate><title>Cloud Security based on the Homomorphic Encryption</title><author>Al-Sit, Waleed T ; Al-Jubouri, Qussay ; Al-Zoubi, Hani</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c274t-585c7ed9a515cd725fa1bd2b4c9caf2a9bbb3db3347fc4e6aaf603ae1cbbba853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Cloud computing</topic><topic>Cybersecurity</topic><topic>Encryption</topic><toplevel>online_resources</toplevel><creatorcontrib>Al-Sit, Waleed T</creatorcontrib><creatorcontrib>Al-Jubouri, Qussay</creatorcontrib><creatorcontrib>Al-Zoubi, Hani</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science &amp; applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Sit, Waleed T</au><au>Al-Jubouri, Qussay</au><au>Al-Zoubi, Hani</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloud Security based on the Homomorphic Encryption</atitle><jtitle>International journal of advanced computer science &amp; applications</jtitle><date>2019</date><risdate>2019</risdate><volume>10</volume><issue>8</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2019.0100838</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2158-107X
ispartof International journal of advanced computer science & applications, 2019, Vol.10 (8)
issn 2158-107X
2156-5570
language eng
recordid cdi_proquest_journals_2655164722
source Publicly Available Content Database; EZB-FREE-00999 freely available EZB journals
subjects Cloud computing
Cybersecurity
Encryption
title Cloud Security based on the Homomorphic Encryption
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T01%3A12%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloud%20Security%20based%20on%20the%20Homomorphic%20Encryption&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Al-Sit,%20Waleed%20T&rft.date=2019&rft.volume=10&rft.issue=8&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2019.0100838&rft_dat=%3Cproquest_cross%3E2655164722%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c274t-585c7ed9a515cd725fa1bd2b4c9caf2a9bbb3db3347fc4e6aaf603ae1cbbba853%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2655164722&rft_id=info:pmid/&rfr_iscdi=true