Authors: Khalid El Makkaoui; Abdellah Ezzati; Abderrahim Beni Hssane
Addresses: Mathematics and Computer Science Department, Sciences and Techniques Faculty, Hassan 1st University, LAVETE Laboratory, Settat, Morocco ' Mathematics and Computer Science Department, Sciences and Techniques Faculty, Hassan 1st University, LAVETE Laboratory, Settat, Morocco ' Computer Science Department, Sciences Faculty, Chouaïb Doukkali University, LAROSERI Laboratory, El Jadida, Morocco
Abstract: With the emergence of cloud computing, the concept of security has become a major issue. Indeed, the key challenge is to ensure customers that the selected cloud provider may store and process the sensitive data confidentially. If this is a storage service, data can be encrypted before sending them to the cloud server; in this case, data confidentiality is assured. However, before performing treatments, these data must be decrypted. It is this step that can be considered a breach of confidentiality. Indeed, the fear of seeing sensitive data be processed in raw is a major obstacle in adopting cloud services. To overcome this obstacle and strengthen confidence in the cloud services, in this paper we propose the adoption of homomorphic encryption technique which allows to perform operations on encrypted data without knowing the key secret.
Keywords: cloud computing; cloud security; trust; confidentiality; homomorphic encryption; secure storage; data storage; cryptography.
International Journal of Cloud Computing, 2016 Vol.5 No.3, pp.207 - 217
Available online: 27 Oct 2016Full-text access for editors Access for subscribers Purchase this article Comment on this article