Downloads: 113 | Views: 200
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.8 / 10
Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing
Navjeet Singh, Rimple Ahuja
Abstract: Cloud Computing is a model which is used for the delivery of appropriate and on-demand network access. Cloud Computing enables a user to accumulate the data in the cloud and access it directly from anywhere with the help of internet without the use of any hardware storage device. But, while the storage and accessing of data, Cloud Computing faces many complications such as security, congestion or traffic or management of resources. The security to the cloud can be provided by the means of data, storage and network. Hence, to provide the secure data storage and retrieval, many techniques have been proposed in the form of symmetric several cryptographic algorithms like symmetric and asymmetric key algorithms which encrypts the message to be sent. But, the previous techniques also faces some of the drawbacks which diminishes the functionality of Cloud Computing. To provide, secure data storage and retrieval, Fully Homomorphic encryption is being used in this paper which works on the concept of asymmetric key algorithm. This encryption technique provides specific types of computations to be taken out on ciphertext and also to obtain the outcomes in the form of encryption which then matches with the original text after the decryption. But, to reduce the size of data after the encryption in fully homomorphic scheme, the fuzzy rules are put into practice for the reduction of encrypted data in fully homomorphic scheme. The simulator used in this paper is MATLAB. The simulation results reveal that the proposed algorithm outperforms the previous one by reducing the size of encrypted and compressed data.
Keywords: Cloud Computing, Fully Homomorphic Encryption FHE, Encryption, Decryption, Security, Fuzzy Rules
Edition: Volume 3 Issue 8, August 2014
Pages: 968 - 972
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 723
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera