Visible to the public Fully Homomorphic Encryption for Data Security Over Cloud

TitleFully Homomorphic Encryption for Data Security Over Cloud
Publication TypeConference Paper
Year of Publication2022
AuthorsKumar, A Vijaya, Bhavana, Kollipara, Yamini, Cheedella
Conference Name2022 6th International Conference on Electronics, Communication and Aerospace Technology
Date Publisheddec
KeywordsAerospace electronics, cloud, Data security, Electric breakdown, Encryption, fully homomorphic encryption, homomorphic encryption, Human Behavior, human factors, Memory, Metrics, Organizations, pubcrawl, reliability, resilience, Resiliency, Scalability
AbstractFrom the past few years cloud services are so popular and are being used by many people from various domains for various purposes such as data storage, e-mails, backing up data and much more. While there were many options to perform such things why did people choose cloud? The answer is clouds are more flexible, convenient, reliable and efficient. Coming to security of data over cloud, it is secure to store data over cloud rather than storing data locally as there is chance of some computer breakdown or any natural disaster may also occur. There are also many threats for data security over cloud namely data breaching, lack of access-key management and much more. As the data has been processed and being stored online for various purposes, there is a clear requirement for data security. Many organizations face various challenges while storing their data over cloud such as data leakages, account hijacking, insufficient credentials and so on. So to overcome these challenges and safeguard the data, various encryption techniques were implemented. However, even though encryption is used, the data still needs to be decrypted in order to do any type of operation. As a result, we must choose a manner in which the data can be analyzed, searched for, or used in any other way without needing to be decoded. So, the objective is to introduce a technique that goes right for the above conditions mentioned and for data security over cloud.
DOI10.1109/ICECA55336.2022.10009404
Citation Keykumar_fully_2022