The full text of this article

 

Homomorphic encryption applied to secure storage and treatments of data in cloud
by Khalid El Makkaoui; Abdellah Ezzati; Abderrahim Beni Hssane
International Journal of Cloud Computing (IJCC), Vol. 5, No. 3, 2016

 

Abstract: With the emergence of cloud computing, the concept of security has become a major issue. Indeed, the key challenge is to ensure customers that the selected cloud provider may store and process the sensitive data confidentially. If this is a storage service, data can be encrypted before sending them to the cloud server; in this case, data confidentiality is assured. However, before performing treatments, these data must be decrypted. It is this step that can be considered a breach of confidentiality. Indeed, the fear of seeing sensitive data be processed in raw is a major obstacle in adopting cloud services. To overcome this obstacle and strengthen confidence in the cloud services, in this paper we propose the adoption of homomorphic encryption technique which allows to perform operations on encrypted data without knowing the key secret.

Online publication date: Thu, 27-Oct-2016

 

is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

 
Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

 
Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Cloud Computing (IJCC):
Login with your Inderscience username and password:

 

    Username:        Password:         

Forgotten your password?


 
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

 
If you still need assistance, please email subs@inderscience.com