Atewologun Olumide, A. Alsadoon, P. Prasad, L. Pham
{"title":"用于安全云计算的混合加密模型","authors":"Atewologun Olumide, A. Alsadoon, P. Prasad, L. Pham","doi":"10.1109/ICTKE.2015.7368466","DOIUrl":null,"url":null,"abstract":"Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A hybrid encryption model for secure cloud computing\",\"authors\":\"Atewologun Olumide, A. Alsadoon, P. Prasad, L. Pham\",\"doi\":\"10.1109/ICTKE.2015.7368466\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.\",\"PeriodicalId\":128925,\"journal\":{\"name\":\"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTKE.2015.7368466\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTKE.2015.7368466","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A hybrid encryption model for secure cloud computing
Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.