USE OF HOMOMORPHIC TECHNIQUE IN CLOUD COMPUTING SECURITY:A REVIEW 1Ravneet Kaur 2Er.Harmandeep Singh 1M.Tech 2nd year(CE)Comp.Engg. Dept 2 Assistant Professor(CE) Comp.Engg. Dept University College Of Engg. University College Of Engg. Punjabi University Patiala,Punjab(India) Punjabi University Patiala,Punjab(India) 1ravneetkaur337@gmail.com 2 harmanjhajj@yahoo.co.in Abstract:Cloud computing is a paradigm in which services (Iaas,Paas,Saas) are rented to the user as per demand.But data security is main issue when we are using public cloud service provider.whether the confidential data kept on the central storage on cloud is secure? when we transfer data to cloud we use standard encryption tecnique to secure the data. But when we have to do computations on data stored on cloud then we have to decode data i.e provide private key every time which is not a secure method.In this paper we are introducing a technique which allow us to do computations on encrypted data which is kept on cloud on remote servers without need of any private key and without decoding it.Result of computations will be same as computations performed on raw
The most important lesson Atticus teaches Scout and Jem is that real courage isn’t from physical intimidation, but from a mental standpoint.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
One of the main reasons to deliver security and privacy for the data in cloud computing is, as it utilizes distributed resources in an unsecured location or environment to allocate their services among people that belong to different organizations [1]. Enlargement in cloud adoption rates will result in increased computing security problems [2]. The greatest terror of cloud clients is that, most of the companies are not relaxed or comfortable accumulating their data and applications on systems that exists outside of their own assumed data centers [3]. Increased security of potential unwarranted approach and discovery to customer’s personal information is caused by relocating workloads to a distributed infrastructure. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security challenges and solutions for protecting data in the cloud and also aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we made a research analysis of an overview of security and privacy levels in secure provisioning and composition, about the interfaces which are been provided to user throughout the data storage and recovery and backup techniques which have been developed in the cloud p province where the data of the clients can be backed up[4]
From the viewpoint of data security, which has always been an important form of quality of service, Cloud computing surely poses new challenging security threats for number of reasons. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be straight accepted due to users loss control of data under cloud computing. Therefore, verification of correct data storage in the cloud must be attended without accurate knowledge of the whole data. Considering different kind of data for every user stored in the cloud and the requirement of long term continuous security of their data safety, the problem of checking correctness of data storage in the cloud becomes even more challenging.[1]
Cloud computing is vast and so are the security threats. When a company opts for cloud computing, it will consider the advantages, but some of the companies fail to consider the vulnerabilities that might lead to data lost and misuse.
Being one of the largest growing technologies in the world right now, cloud computing is gaining a lot of popularity. Many people and organizations are moving from the traditional computing systems to the cloud computing. Giving so many benefits like low cost, high service availability and data accessibility, cloud computing is helping every organization. But with so many advantages, also come some barriers like security and privacy issue. Cloud security is a very important factor to be ensured both by the cloud provider and user. The paper aims to discuss more on cloud
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
“Cloud computing” simply means “Internet computing “, generally the internet is seen as collection of clouds; thus the word cloud computing can be defined as utilizing the internet to provide technology enabled services to the people and organizations[1]. Cloud computing is a powerful emerging service that provides an optimized and efficient computing platform by using sharing and virtualization concepts and improving availability, scalability, collaboration and agility for users and enterprises [2]. Cloud computing has a rapid growth in IT industries due to the considerable benefits of sorting and maintaining resources in unlimited storages with the most cost efficient method, business continuity and scalability [3]. However, the only hurdle in wide adoption of this newfound technology is lack of security especially in data protection, authentication, and data transmission subject [4].
In this we discuss first about the no of pressing security challenges in Cloud Computing and outsourcing security, secure computation outsourcing challenges The we will focus on the primitive services, storing of data in the cloud by giving access to the owner outsourcing there data to cloud for getting the further benefits. The owner no longer having physical possession of the outsourced data raises on the storage correctness by big security concerns. So providing the access for the secure storage auditing in the cloud environment with this new approaches challenging, impressive and we can store the data by outsourcing security in the cloud computing and we
The benefits such as low cost and convenience of cloud computing services have significantly changed our day to days activities, however, there are numerous security issues facing cloud computing making it difficult to maintain data security and privacy, support data and service availability and
Cloud computing is an internet-based storage and management computer. It is a flexible, efficient, economic, environment friendly IT technology. For these advantages and the big business value of cloud computing, thousands of companies and institutions in different industries have begun to use cloud computing technology. For the widely use of cloud computing, now we are in the age of cloud computing. How to deal with its challenges has become a problem we are feeling obliged to face, especially the security issues. This research paper will first describe some characteristics and definitions of cloud computing. In section two, I will show two kinds of patterns of cloud computing,
Cloud computing is the technology which provides services in various forms through online . The number of online stores for storage are available to back up our data and accessing the data anywhere at anytime. Cloud computing is a pervasive advancement which gives a beneficiary way to the clients to benefit the cloud applications on interest. It refers to the network service in which services are provided with guaranteed QoS, inexpensive computing infrastructures with an easy and simple access on demand and is enabled through a set of network. Without proper security and privacy mechanisms designed for the
Cloud computing is a type of computing, instead of having local servers or personal devices to handle applications it trusts on sharing computing resources. Cloud data storage has many advantages over local data storage. This paper mainly focuses on security concerned privacy data enhancement in the cloud environment. This would serve as the promising analysis to ken about the reinforcing approach utilized for resolving the privacy issues and the security threats occurred in the cloud resources. This paper describes different problems associated to privacy while saving user’s data on third party service providers, which is more generally called as cloud service. There is a lot of investigation being made to spot out the issues with these cloud service providers and cloud security in general. This would serve as the promising analysis to know about the strengthening approach used for resolving the privacy issues and the security threats occurred in the cloud resources. The Major problem in Cloud Computing is a Data security. Data is accessed anywhere without retaining local copy of data in cloud storage. The data is not secured with others as cloud provider cannot be trusted. Thus, enabling public audibility for cloud storage is of critical importance so that users can resort to a TPA to check the integrity of outsourced data.
People have always concerned about the security of their important documents as well as information. The Roman Empire military delivered sensitive and secure messages on parchments that could be dissolved in water after getting the information. But nowadays, what most of us use to store our documents in the cloud. Cloud computing is one of the common words in this modern world, the 21st century, the practice of using the network to control the servers that hosted on the internet to store, manage, and process data rather than a local server or a personal computer. The security in information technology is considered as the biggest challenge
The question arises whether our data and the way it is managed are safe and trustworthy in cloud data centres.