Loading…
Cloud Security based on the Homomorphic Encryption
Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is h...
Saved in:
Published in: | International journal of advanced computer science & applications 2019, Vol.10 (8) |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 8 |
container_start_page | |
container_title | International journal of advanced computer science & applications |
container_volume | 10 |
creator | Al-Sit, Waleed T Al-Jubouri, Qussay Al-Zoubi, Hani |
description | Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system. |
doi_str_mv | 10.14569/IJACSA.2019.0100838 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2655164722</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2655164722</sourcerecordid><originalsourceid>FETCH-LOGICAL-c274t-585c7ed9a515cd725fa1bd2b4c9caf2a9bbb3db3347fc4e6aaf603ae1cbbba853</originalsourceid><addsrcrecordid>eNotkEtLw0AUhQdRsNT-AxcDrhPnPckyhGorBRdVcDfMKzSlzcSZZNF_b2x6z-IeOId74QPgGaMcMy7K1-1HVe-rnCBc5ggjVNDiDiwI5iLjXKL7qy8yjOTPI1ildETT0JKIgi4AqU9hdHDv7Rjb4QKNTt7B0MHh4OEmnCfF_tBauO5svPRDG7on8NDoU_Kr216C77f1V73Jdp_v27raZZZINmS84FZ6V2qOuXWS8EZj44hhtrS6Ibo0xlBnKGWyscwLrRuBqPbYToEuOF2Cl_luH8Pv6NOgjmGM3fRSEcE5FkwSMrXY3LIxpBR9o_rYnnW8KIzUFZCaAal_QOoGiP4BIHFZgw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2655164722</pqid></control><display><type>article</type><title>Cloud Security based on the Homomorphic Encryption</title><source>Publicly Available Content Database</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Al-Sit, Waleed T ; Al-Jubouri, Qussay ; Al-Zoubi, Hani</creator><creatorcontrib>Al-Sit, Waleed T ; Al-Jubouri, Qussay ; Al-Zoubi, Hani</creatorcontrib><description>Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2019.0100838</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Cloud computing ; Cybersecurity ; Encryption</subject><ispartof>International journal of advanced computer science & applications, 2019, Vol.10 (8)</ispartof><rights>2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2655164722?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,44590</link.rule.ids></links><search><creatorcontrib>Al-Sit, Waleed T</creatorcontrib><creatorcontrib>Al-Jubouri, Qussay</creatorcontrib><creatorcontrib>Al-Zoubi, Hani</creatorcontrib><title>Cloud Security based on the Homomorphic Encryption</title><title>International journal of advanced computer science & applications</title><description>Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.</description><subject>Cloud computing</subject><subject>Cybersecurity</subject><subject>Encryption</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNotkEtLw0AUhQdRsNT-AxcDrhPnPckyhGorBRdVcDfMKzSlzcSZZNF_b2x6z-IeOId74QPgGaMcMy7K1-1HVe-rnCBc5ggjVNDiDiwI5iLjXKL7qy8yjOTPI1ildETT0JKIgi4AqU9hdHDv7Rjb4QKNTt7B0MHh4OEmnCfF_tBauO5svPRDG7on8NDoU_Kr216C77f1V73Jdp_v27raZZZINmS84FZ6V2qOuXWS8EZj44hhtrS6Ibo0xlBnKGWyscwLrRuBqPbYToEuOF2Cl_luH8Pv6NOgjmGM3fRSEcE5FkwSMrXY3LIxpBR9o_rYnnW8KIzUFZCaAal_QOoGiP4BIHFZgw</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Al-Sit, Waleed T</creator><creator>Al-Jubouri, Qussay</creator><creator>Al-Zoubi, Hani</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2019</creationdate><title>Cloud Security based on the Homomorphic Encryption</title><author>Al-Sit, Waleed T ; Al-Jubouri, Qussay ; Al-Zoubi, Hani</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c274t-585c7ed9a515cd725fa1bd2b4c9caf2a9bbb3db3347fc4e6aaf603ae1cbbba853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Cloud computing</topic><topic>Cybersecurity</topic><topic>Encryption</topic><toplevel>online_resources</toplevel><creatorcontrib>Al-Sit, Waleed T</creatorcontrib><creatorcontrib>Al-Jubouri, Qussay</creatorcontrib><creatorcontrib>Al-Zoubi, Hani</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science & applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Sit, Waleed T</au><au>Al-Jubouri, Qussay</au><au>Al-Zoubi, Hani</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloud Security based on the Homomorphic Encryption</atitle><jtitle>International journal of advanced computer science & applications</jtitle><date>2019</date><risdate>2019</risdate><volume>10</volume><issue>8</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2019.0100838</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2158-107X |
ispartof | International journal of advanced computer science & applications, 2019, Vol.10 (8) |
issn | 2158-107X 2156-5570 |
language | eng |
recordid | cdi_proquest_journals_2655164722 |
source | Publicly Available Content Database; EZB-FREE-00999 freely available EZB journals |
subjects | Cloud computing Cybersecurity Encryption |
title | Cloud Security based on the Homomorphic Encryption |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T01%3A12%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloud%20Security%20based%20on%20the%20Homomorphic%20Encryption&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Al-Sit,%20Waleed%20T&rft.date=2019&rft.volume=10&rft.issue=8&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2019.0100838&rft_dat=%3Cproquest_cross%3E2655164722%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c274t-585c7ed9a515cd725fa1bd2b4c9caf2a9bbb3db3347fc4e6aaf603ae1cbbba853%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2655164722&rft_id=info:pmid/&rfr_iscdi=true |