Rate the Article: A Review on Encryption Techniques to Secure a Cloud, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 106 | Views: 399

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Rating: 6.7 / 10


A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma


Abstract: Cloud computing brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers which is not within the same trusted domain as data owners. Homomorphic encryption is a form of security technique which allows specific types of computations to be carried out on encrypted data (text) and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. To keep sensitive user data confidential against untrusted servers, cryptographic methods are used by disclosing data decryption keys only to authorized users. There are various cryptographic methods are used by disclosing data decryption keys only to authorized users To keep sensitive user data confidential against untrusted servers. In this paper, a review on different encryption techniques is done to protect cloud data. [10]


Keywords: Homomorphic encryption, cloud computing, Unpadded RSA, security, AES


Edition: Volume 3 Issue 7, July 2014,


Pages: 1398 - 1401



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top