B. Joshi, Bansidhar Joshi, Anupama Mishra, Varsha Arya, A. Gupta, D. Peraković
{"title":"云计算中保护隐私的同态加密技术的比较研究","authors":"B. Joshi, Bansidhar Joshi, Anupama Mishra, Varsha Arya, A. Gupta, D. Peraković","doi":"10.4018/ijcac.309936","DOIUrl":null,"url":null,"abstract":"In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in cloud computing as thoroughly as this study has. This paper discusses the challenges involved in maintaining the privacy of cloud-based data and the techniques used to address these challenges. It was identified that homomorphic encryption is the best solution of all. This work also identified and compared the various homomorphic encryption schemes which are capable of ensuring the privacy of data in cloud storage and ways to implement them through libraries.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"829 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing\",\"authors\":\"B. Joshi, Bansidhar Joshi, Anupama Mishra, Varsha Arya, A. Gupta, D. Peraković\",\"doi\":\"10.4018/ijcac.309936\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in cloud computing as thoroughly as this study has. This paper discusses the challenges involved in maintaining the privacy of cloud-based data and the techniques used to address these challenges. It was identified that homomorphic encryption is the best solution of all. This work also identified and compared the various homomorphic encryption schemes which are capable of ensuring the privacy of data in cloud storage and ways to implement them through libraries.\",\"PeriodicalId\":442336,\"journal\":{\"name\":\"Int. J. Cloud Appl. Comput.\",\"volume\":\"829 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Cloud Appl. Comput.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijcac.309936\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Cloud Appl. Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijcac.309936","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in cloud computing as thoroughly as this study has. This paper discusses the challenges involved in maintaining the privacy of cloud-based data and the techniques used to address these challenges. It was identified that homomorphic encryption is the best solution of all. This work also identified and compared the various homomorphic encryption schemes which are capable of ensuring the privacy of data in cloud storage and ways to implement them through libraries.