SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1010
DATA SECURITY IN CLOUD COMPUTING USING HOMOMORPHIC
ALGORITHAM
Amruta Patil1, Apurva Kirve2, Sayali Nandeshwar3, Swati Taru4
1,2,3,4Dept. of Information Technology, Zeal College of Engineering Research, Narhe, Pune, 411041
---------------------------------------------------------------------***----------------------------------------------------------------------
ABSTRACT: The framework of cloud computing receiving a good deal of attention each in publication and different users. Cloud
computing is that the system of computing solution over the web. Cloud computing services enable people and businesses to use
hardware and computer code technique that area unit control by cloud suppliers at remote locations. The space betweentheuser
and therefore the physical location of his information creates a stopper as a result of this information is accessed by a 3rd party
and this is able to have an effect on the privacy of user information. The mistreatment of ancient secret writing schemes to
encipher the remoted information before transfer to the cloud supplier has been most generallyusedsystemtobridgethissecurity
tittle-tattle. But, the user can got to give the non-public key to the server to decode the info before perform the action needed.
Homomorphic secret writing use to execute computations on encrypted information while not coding. The need of homomorphic
secret writing to encipher the user information in cloud server and conjointly it'll be accustomed execute needed perform on this
encrypted file or information.
Keywords: cloud computing, Homomorphic encryption, Key generation, OTP.
1. INTRODUCTION:
Cloud Computing has seem as a vital paradigm thathasattracttidyattentionineachbusinessandworld.CloudComputinghave
totally different names referred to as as "outsourcing" and "server hosting." however the less action taken by the processors
used, fine net connections and therefore the enthusiastically prices of the substances used, don't enable the employment of
facility and storage areas. However, current advances in resent technology via virtualization paved the method for these
functions with quicker process.
Cloud Computing security challenges associated it’s additionally a drawback to several researchers; very first thing was to
specialize in security that is that the biggest entity of organizations that area unit considering a proceed to the cloud. The
employment of cloud computing guide loads of benefits together with decreases prices, simple to use and provisioning of
functions. The primary real use of the tactic of cloud computing was in 2002 by the corporate Amazon net Services, once it
borrow its resources to corporations throughout interval off on demand.
Many users use the cloud daily while not knowing. A bit like altogether versions of email and access to the applications that
don't seem to be part put in on the native computer as paint, Microsoft Word. This use is finished due to Ethernet, however
customers might not understand the situation of the servers that keep their emails and hosting the supply file of the
applications that user uses. The functions offered by the Cloud Computing suppliers, come back from giant digital stations
referred to as Datacenters, victimization wayssupported virtualization.Thevirtualizationisall thetechnical substancesand/or
software system which will run on one machine multiple operational systems and/or multiple applications, one by one from
one another, as if they were performing on unrelated physical machines. Virtualization and consolidation will simply the
management of the server’s park, by decreasing the amount of systems to be maintained by optimizing the employment of
resources and enabling high accessibility. However the adoption and therefore the passage to the Cloud Computing remodel
provided that the protection is ensured. The way to warranty a higher file security and additionally however will we have a
tendency to keep the user non-public info confidential? Therearea unit2mainqueriesthatgifta challengetoCloudComputing
suppliers.
2. PROBLEM DEFINITION AND OBJECTIVE:
Industries start switching from local to cloud server because cloud service providers are more relating and provides large
amount of storage space. However, such great advantages, problem of data security and privacy comestowardscompany.The
data outsourced by various data users may get harmed by attacker, malware or threats.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1011
3. LITERATURE SURVEY
3.1 Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile
Cloud Computing:
In this paper, secret writing perform like RSA and Daffier playwright cryptosystem proves to be useless against the attacks
done by quantum laptop. Hence, Homomorphic Signaturethemeispresentalongside theIdentityManagement(IDM)usedinto
the mobile cloud computing so as to trace this issue by applying implicit verificationmethodologytoclassificationbetweenthe
real and non-genuine persons that permits system to manifest the users properly. The small print of the system are more
examine later during this paper, wherever the user are genuine with IDM as development and no secret is employed
throughout the verification method, permitting the users to be safely genuine at the tip of the program in execution.
3.2 Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm:
In this survey we've make a case for concerning new security system victimization interchangeablekeycryptographyruleand
steganography .In this planned framework AES, blowfish, RC6 and bandeau algorithms are accustomedstyleblock wisesafety
to file. All rule key size is 128 bit’s steganography system is introduced for key infosafety.Keyinfocontributesthata partoffile
is encrypted victimization by that rule and key .File is collapse into 8 components. Every and each a part of information is
encrypted victimization totally different rule. All components of file are encrypted sequins with the assistance of
multithreading functions. Encoding Keys are inserted into cowl image victimization LSB technique. Steno image is transfer to
valid receiver victimization email. For information coding purpose reverse method of encoding is applied.
3.3 Secure Cloud Computing Algorithm Using Homomorphic Encryption And Multi Party Computation:
In this survey, the user’s file is encrypted victimization artifact techniques, referred to as optimum uneven encoding artifact
(OAEP) along with Hybrid encoding algorithmic program that's gift on RSA (i.e., HE-RSA), so as to permit multiple parties to
transmit a perform on their inputs whereas protective Integrity and Confidentiality. The Homomorphic Encryption (HE) is
employed on the encrypted information while not decrypting it in computationally powerful clouds andalsotheSecureMulti-
Party Computation (SMPC) will be utilized in the cloud to make sure security and privacy of the purchasers. During thispaper,
we've planned a system that integrates the multi-party computation with homomorphic encoding to permit mathematical
calculations of encrypted information while not secret writing. The cryptologic system utilized in our cloud model square
measure represented and also the overheads square measure compared with Homomorphic encoding and Multi-Party
Computation.
4. PROPOSED SYSTEM ARCHITECTURE:
Fig 1. Proposed System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1012
When the information transferred to the Cloud server we have a tendency to use normal coding ways to securethe operations
and also the storage of the information. Our basic conception is to inscribe the information beforesendittotheCloudsupplier.
However the last one needed to rewrite files at each operate acting. knowledge the info the information} owner canhavetobe
compelled to give the non-public key to the server (Cloud provider) to rewrite data before execute the calculations needed,
which could have an effect on the confidentiality and privacy of knowledge hold on within the Cloud. This design proposing
associate degree supply of a operate to execute operations on encrypted file while not decrypting them, which can use an
equivalent outputs once calculations as if we've got worked directly on the data.
Homomorphic coding wont to perform operations on encrypted information while not knowing the non-public key (without
decryption), the information owner is that the solely holder of the key key. After werewritetheoutputsofanyfunctions,it'san
equivalent as if we have a tendency to have borrowed out the calculation on the unused information.
5. CONCLUSIONS:
To summarize, the work provides a model of a framework which will be utilized by organizations to safeguard and manage
their knowledge hold on over untrusted public clouds. As a part of the work the likelihood of victimization delta encryption
ideas beside homomorphic cryptography theme with additive homomorphy to update encrypted files, rather than sending
entire encrypted versions every time once associate degree update, was explored. Below the take a look at atmosphere, the
developed model has delivered promising performance results as compared to alternative common solutions. Therefore the
planned approach may be thought-about to be used in universe situations.
The security topic square measure a giant downside for cloud computing development. To keep up the privacy of his file, the
user should encipher knowledge before being transfer to the cloud. Cloud computing security supported homomorphic
cryptography strategy, as a result of these strategy permit to perform computations on encrypted knowledge while not the
employment of the key key. partly Homomorphic cryptography (PHE) like RSA and Paillier functions square measure
inadequate to secure cloud computing as a result of these conspire permit to perform only 1 operation (either addition or
multiplication) on the encrypted knowledge of user.
REFERENCES
1. P. Mell, T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, U. S.
Department of Commerce, (2011)
2. K. Lauter, M. Naehrig, V. Vaikuntanathan, “Can Homomorphic Encryption be Practical?”, CCSW' 11, Chicago, llinois,
USA, pp. 113–124, (2011).
3. Craig Gentry, “Fully homomorphic encryption using ideal lattice”, in Proceedings of STOC’09, (2009).
4. M. van Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, “Fully homomorphic encryptionovertheIntegers”,inProceedings
of Advances in Cryptology, EUROCRYPT’10, pages 24–43, 2010.
5. Craig Gentry, “Computing arbitrary functions of encrypted data”, Communicationsof TheACM,53(3):97-105,(2010).
6. J. Li, D. Song, S. Chen, X. Lu, “A Simple Fully Homomorphic Encryption Scheme Available in Cloud Computing”, In
Proceeding of IEEE, (2012).
7. Baohua Chen, Na Zhao, “Fully Homomorphic Encryption Application in Cloud Computing”, in Wavelet Active Media
Technology and Information Processing (ICCWAMTIP), 11th International Computer Conference, (2014).

More Related Content

What's hot

Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 

What's hot (20)

IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 

Similar to IRJET - Data Security in Cloud Computing using Homomorphic Algoritham

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 

Similar to IRJET - Data Security in Cloud Computing using Homomorphic Algoritham (20)

IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
I017225966
I017225966I017225966
I017225966
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1010 DATA SECURITY IN CLOUD COMPUTING USING HOMOMORPHIC ALGORITHAM Amruta Patil1, Apurva Kirve2, Sayali Nandeshwar3, Swati Taru4 1,2,3,4Dept. of Information Technology, Zeal College of Engineering Research, Narhe, Pune, 411041 ---------------------------------------------------------------------***---------------------------------------------------------------------- ABSTRACT: The framework of cloud computing receiving a good deal of attention each in publication and different users. Cloud computing is that the system of computing solution over the web. Cloud computing services enable people and businesses to use hardware and computer code technique that area unit control by cloud suppliers at remote locations. The space betweentheuser and therefore the physical location of his information creates a stopper as a result of this information is accessed by a 3rd party and this is able to have an effect on the privacy of user information. The mistreatment of ancient secret writing schemes to encipher the remoted information before transfer to the cloud supplier has been most generallyusedsystemtobridgethissecurity tittle-tattle. But, the user can got to give the non-public key to the server to decode the info before perform the action needed. Homomorphic secret writing use to execute computations on encrypted information while not coding. The need of homomorphic secret writing to encipher the user information in cloud server and conjointly it'll be accustomed execute needed perform on this encrypted file or information. Keywords: cloud computing, Homomorphic encryption, Key generation, OTP. 1. INTRODUCTION: Cloud Computing has seem as a vital paradigm thathasattracttidyattentionineachbusinessandworld.CloudComputinghave totally different names referred to as as "outsourcing" and "server hosting." however the less action taken by the processors used, fine net connections and therefore the enthusiastically prices of the substances used, don't enable the employment of facility and storage areas. However, current advances in resent technology via virtualization paved the method for these functions with quicker process. Cloud Computing security challenges associated it’s additionally a drawback to several researchers; very first thing was to specialize in security that is that the biggest entity of organizations that area unit considering a proceed to the cloud. The employment of cloud computing guide loads of benefits together with decreases prices, simple to use and provisioning of functions. The primary real use of the tactic of cloud computing was in 2002 by the corporate Amazon net Services, once it borrow its resources to corporations throughout interval off on demand. Many users use the cloud daily while not knowing. A bit like altogether versions of email and access to the applications that don't seem to be part put in on the native computer as paint, Microsoft Word. This use is finished due to Ethernet, however customers might not understand the situation of the servers that keep their emails and hosting the supply file of the applications that user uses. The functions offered by the Cloud Computing suppliers, come back from giant digital stations referred to as Datacenters, victimization wayssupported virtualization.Thevirtualizationisall thetechnical substancesand/or software system which will run on one machine multiple operational systems and/or multiple applications, one by one from one another, as if they were performing on unrelated physical machines. Virtualization and consolidation will simply the management of the server’s park, by decreasing the amount of systems to be maintained by optimizing the employment of resources and enabling high accessibility. However the adoption and therefore the passage to the Cloud Computing remodel provided that the protection is ensured. The way to warranty a higher file security and additionally however will we have a tendency to keep the user non-public info confidential? Therearea unit2mainqueriesthatgifta challengetoCloudComputing suppliers. 2. PROBLEM DEFINITION AND OBJECTIVE: Industries start switching from local to cloud server because cloud service providers are more relating and provides large amount of storage space. However, such great advantages, problem of data security and privacy comestowardscompany.The data outsourced by various data users may get harmed by attacker, malware or threats.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1011 3. LITERATURE SURVEY 3.1 Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile Cloud Computing: In this paper, secret writing perform like RSA and Daffier playwright cryptosystem proves to be useless against the attacks done by quantum laptop. Hence, Homomorphic Signaturethemeispresentalongside theIdentityManagement(IDM)usedinto the mobile cloud computing so as to trace this issue by applying implicit verificationmethodologytoclassificationbetweenthe real and non-genuine persons that permits system to manifest the users properly. The small print of the system are more examine later during this paper, wherever the user are genuine with IDM as development and no secret is employed throughout the verification method, permitting the users to be safely genuine at the tip of the program in execution. 3.2 Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm: In this survey we've make a case for concerning new security system victimization interchangeablekeycryptographyruleand steganography .In this planned framework AES, blowfish, RC6 and bandeau algorithms are accustomedstyleblock wisesafety to file. All rule key size is 128 bit’s steganography system is introduced for key infosafety.Keyinfocontributesthata partoffile is encrypted victimization by that rule and key .File is collapse into 8 components. Every and each a part of information is encrypted victimization totally different rule. All components of file are encrypted sequins with the assistance of multithreading functions. Encoding Keys are inserted into cowl image victimization LSB technique. Steno image is transfer to valid receiver victimization email. For information coding purpose reverse method of encoding is applied. 3.3 Secure Cloud Computing Algorithm Using Homomorphic Encryption And Multi Party Computation: In this survey, the user’s file is encrypted victimization artifact techniques, referred to as optimum uneven encoding artifact (OAEP) along with Hybrid encoding algorithmic program that's gift on RSA (i.e., HE-RSA), so as to permit multiple parties to transmit a perform on their inputs whereas protective Integrity and Confidentiality. The Homomorphic Encryption (HE) is employed on the encrypted information while not decrypting it in computationally powerful clouds andalsotheSecureMulti- Party Computation (SMPC) will be utilized in the cloud to make sure security and privacy of the purchasers. During thispaper, we've planned a system that integrates the multi-party computation with homomorphic encoding to permit mathematical calculations of encrypted information while not secret writing. The cryptologic system utilized in our cloud model square measure represented and also the overheads square measure compared with Homomorphic encoding and Multi-Party Computation. 4. PROPOSED SYSTEM ARCHITECTURE: Fig 1. Proposed System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1012 When the information transferred to the Cloud server we have a tendency to use normal coding ways to securethe operations and also the storage of the information. Our basic conception is to inscribe the information beforesendittotheCloudsupplier. However the last one needed to rewrite files at each operate acting. knowledge the info the information} owner canhavetobe compelled to give the non-public key to the server (Cloud provider) to rewrite data before execute the calculations needed, which could have an effect on the confidentiality and privacy of knowledge hold on within the Cloud. This design proposing associate degree supply of a operate to execute operations on encrypted file while not decrypting them, which can use an equivalent outputs once calculations as if we've got worked directly on the data. Homomorphic coding wont to perform operations on encrypted information while not knowing the non-public key (without decryption), the information owner is that the solely holder of the key key. After werewritetheoutputsofanyfunctions,it'san equivalent as if we have a tendency to have borrowed out the calculation on the unused information. 5. CONCLUSIONS: To summarize, the work provides a model of a framework which will be utilized by organizations to safeguard and manage their knowledge hold on over untrusted public clouds. As a part of the work the likelihood of victimization delta encryption ideas beside homomorphic cryptography theme with additive homomorphy to update encrypted files, rather than sending entire encrypted versions every time once associate degree update, was explored. Below the take a look at atmosphere, the developed model has delivered promising performance results as compared to alternative common solutions. Therefore the planned approach may be thought-about to be used in universe situations. The security topic square measure a giant downside for cloud computing development. To keep up the privacy of his file, the user should encipher knowledge before being transfer to the cloud. Cloud computing security supported homomorphic cryptography strategy, as a result of these strategy permit to perform computations on encrypted knowledge while not the employment of the key key. partly Homomorphic cryptography (PHE) like RSA and Paillier functions square measure inadequate to secure cloud computing as a result of these conspire permit to perform only 1 operation (either addition or multiplication) on the encrypted knowledge of user. REFERENCES 1. P. Mell, T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, U. S. Department of Commerce, (2011) 2. K. Lauter, M. Naehrig, V. Vaikuntanathan, “Can Homomorphic Encryption be Practical?”, CCSW' 11, Chicago, llinois, USA, pp. 113–124, (2011). 3. Craig Gentry, “Fully homomorphic encryption using ideal lattice”, in Proceedings of STOC’09, (2009). 4. M. van Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, “Fully homomorphic encryptionovertheIntegers”,inProceedings of Advances in Cryptology, EUROCRYPT’10, pages 24–43, 2010. 5. Craig Gentry, “Computing arbitrary functions of encrypted data”, Communicationsof TheACM,53(3):97-105,(2010). 6. J. Li, D. Song, S. Chen, X. Lu, “A Simple Fully Homomorphic Encryption Scheme Available in Cloud Computing”, In Proceeding of IEEE, (2012). 7. Baohua Chen, Na Zhao, “Fully Homomorphic Encryption Application in Cloud Computing”, in Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 11th International Computer Conference, (2014).