Downloads: 106 | Views: 336
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.7 / 10
A Review on Encryption Techniques to Secure a Cloud
Ramandeep Kaur, Ashish Verma
Abstract: Cloud computing brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers which is not within the same trusted domain as data owners. Homomorphic encryption is a form of security technique which allows specific types of computations to be carried out on encrypted data (text) and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. To keep sensitive user data confidential against untrusted servers, cryptographic methods are used by disclosing data decryption keys only to authorized users. There are various cryptographic methods are used by disclosing data decryption keys only to authorized users To keep sensitive user data confidential against untrusted servers. In this paper, a review on different encryption techniques is done to protect cloud data. [10]
Keywords: Homomorphic encryption, cloud computing, Unpadded RSA, security, AES
Edition: Volume 3 Issue 7, July 2014
Pages: 1398 - 1401
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera