CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Advanced Cryptographic Techniques for Secured Cloud Computing

Published on May 2014 by Nilotpal Chakraborty, G K Patra
International Conference on Current Trends in Advanced Computing
Foundation of Computer Science USA
ICCTAC2014 - Number 1
May 2014
Authors: Nilotpal Chakraborty, G K Patra
c650b33f-69d7-4070-98cb-81e3f8199676

Nilotpal Chakraborty, G K Patra . Advanced Cryptographic Techniques for Secured Cloud Computing. International Conference on Current Trends in Advanced Computing. ICCTAC2014, 1 (May 2014), 10-13.

@article{
author = { Nilotpal Chakraborty, G K Patra },
title = { Advanced Cryptographic Techniques for Secured Cloud Computing },
journal = { International Conference on Current Trends in Advanced Computing },
issue_date = { May 2014 },
volume = { ICCTAC2014 },
number = { 1 },
month = { May },
year = { 2014 },
issn = 0975-8887,
pages = { 10-13 },
numpages = 4,
url = { /proceedings/icctac2014/number1/16171-1406/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Current Trends in Advanced Computing
%A Nilotpal Chakraborty
%A G K Patra
%T Advanced Cryptographic Techniques for Secured Cloud Computing
%J International Conference on Current Trends in Advanced Computing
%@ 0975-8887
%V ICCTAC2014
%N 1
%P 10-13
%D 2014
%I International Journal of Computer Applications
Abstract

The past decade of computing has witnessed a number of new computational models and the most prominent among them is Cloud Computing. Cloud Computing is a paradigm shift that helps a user with internet based computing services that can be accessed from anywhere on any platform. But despite of its advantages, it is yet to gain total trust from users, the primary reason being its security issues. Though some standard organizations have developed a number of security compliance guidelines that need to be followed to ensure security and quality of services in the cloud, security assurance in real terms remains to be undercover. This paper discusses about the two most promising cryptographic techniques, that are, if implemented correctly can effectively mitigate the security threats and can help in an increased uses of cloud computing.

References
  1. Peter Mell, Timothy Grance; The NIST Definition of Cloud Computing; NIST Special Publication 800-145, 2011
  2. D S Bhilare, Nilotpal Chakraborty; Enhanced Security in Cloud Computing Environment, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3 Issue 9, September 2013.
  3. K Hamlen, Security Issues for Cloud Computing, Available online at: http://www. igi-global. com/chapter/security-issues-cloud-computing/
  4. R. Rivest, L. Adleman, and M. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, pages 169-177. Academic Press, 1978
  5. R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21 (2): 120-126, 1978.
  6. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete alogarithms. In Advances in Cryptology—CRYPTO '84, volume 196 of Lecture Notes in Computer Science, pages 10-18. Springer-Verlag, 1985.
  7. Paillier, Pascal. "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes". EUROCRYPT. Springer. pp. 223–238, 1999, doi:10. 1007/3-540-48910-X_16.
  8. C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC '09, pages 169-178, ACM, 2009.
  9. C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. http://crypto. stanford. edu/craig.
  10. Amit Sahai, Brent Waters; "Fuzzy Identity Based Encryption", Proceedings of Eurocrypt, 2005
  11. G K Patra, Nilotpal Chakraborty; Securing Cloud Computing Environment with the help of Fully Homomorphic Encryption, Journal of Computer Technology & Applications, ISSN: 2229-6964, Vol 4 Issue 3, December 2013.
  12. Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. Fully homomorphic encryption over the integers. In Advances in Cryptology - EUROCRYPT'10, volume 6110 of Lecture Notes in Computer Science, pages 24-43. Springer, 2010. Full version available on-line from http://eprint. iacr. org/2009/616
  13. ZHANG-Tong, WU-Qi, LIU-Wen, CHENLiang, Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain, International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, DOI 10. 1109/CyberC. 2012. 35.
  14. S. Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich, Reusable Garbled Circuit and Succinct Functional Encryption, STOC'13, June 1–4, 2013, Palo Alto, California, USA.
  15. Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. Fully homomorphic encryption without bootstrapping. In Innovations in Theoretical Computer Science (ITCS'12), 2012. Available at http://eprint. iacr. org/2011/277
  16. N. P. Smart and F. Vercauteren. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography - PKC'10, volume 6056 of Lecture Notes in Computer Science, pages 420-443. Springer, 2010.
  17. J. S. Coron, D. Naccache, M. Tibouchi; Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the integers", Cryptology ePrint Archive, Report 2011/440, 2011. Available at http://eprint. iacr. org/
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Fully Homomorphic Encryption Functional Encryption