CFP last date
20 December 2024
Reseach Article

Fuzzy Rule based Enhanced Homomorphic Encryption in Cloud Computing

by Randeep Kaur, Supriya Kinger
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 101 - Number 8
Year of Publication: 2014
Authors: Randeep Kaur, Supriya Kinger
10.5120/17706-8709

Randeep Kaur, Supriya Kinger . Fuzzy Rule based Enhanced Homomorphic Encryption in Cloud Computing. International Journal of Computer Applications. 101, 8 ( September 2014), 13-18. DOI=10.5120/17706-8709

@article{ 10.5120/17706-8709,
author = { Randeep Kaur, Supriya Kinger },
title = { Fuzzy Rule based Enhanced Homomorphic Encryption in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 101 },
number = { 8 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume101/number8/17706-8709/ },
doi = { 10.5120/17706-8709 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:31:07.983163+05:30
%A Randeep Kaur
%A Supriya Kinger
%T Fuzzy Rule based Enhanced Homomorphic Encryption in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 101
%N 8
%P 13-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a day's internet services are one of the most popular services for transferring data and information. Cloud Computing is also based on internet services used for storing, transferring and many more operations related to data & work. As it is based on internet services, security is one of the major concerns in this. Numbers of methods or algorithms were implemented for securing data and information. And when the data or information is to be used it has to be decrypted so that it could be used for further process. This becomes a major concern as time consumption increased. So, to solve this issue a new fully homomorphic environment has been introduces in cloud computing. This resolves the time consumption issue but introduce a new issue that is storage space consumption. This work is introduces a new enhanced fuzzy based fully homomorphic environment. As fuzzy is a artificial intelligent system, here it is rule based intelligent system which work on 27 defined rules and helps to achieve this objective of reduces space consumption issue by using lossless compression. Comparative analysis can be done & proves that this enhanced environment is very secure and reduces burden of the network as well.

References
  1. Ling Oian et al, "Cloud Computing: An overview" ,Ist International Conference, December,2009,pp. 626-63.
  2. Ron Rivest, ''Homomorphic Encryption" Volume 3, Issue ,October 29, 2002.
  3. R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, 1978.
  4. Bhabendu Kumar Mohanta and Debasis Gountia, "Fully homomorphic encryption equating to cloud security: An approach" IOSR Journal of Computer Engineering (IOSR-JCE), Volume 9, Issue 2 (Jan. - Feb. 2013), pp. 46-50.
  5. Sunanda Ravindran and Parsi Kalpana, "Data Storage Security Using Partially Homomorphic Encryption in a Cloud" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013, pp. 603-606.
  6. Dr. Chander Kant and Yogesh Sharma, "Enhanced Security Architecture for Cloud Data Security" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013, pp. 571-575.
  7. Uma Somani, "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing," 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  8. RuWei Huang, Si Yu, Wei Zhuang and XiaoLin Gui, "Design of Privacy-Preserving Cloud Storage Framework" 2010 Ninth International Conference on Grid and Cloud Computing.
  9. Farzad Sabahi, "Cloud Computing Security Threats and Responses," IEEE Trans. on Cloud Computing. , vol. 11, no. 6, pp. 670 { 684, 2002. }
  10. Cong Wang, Qian Wang, Kui Ren and Wenjing Lou "Ensuring Data Storage Security in Cloud Computing. " IEEE 2009.
  11. Mehmet Yildiz, Jemal Abawajy, Tuncay Ercan and Andrew Bernoth "A Layered Security Approach for Cloud Computing Infrastructure" 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks. © 2009 IEEE.
  12. Sang-Ho Na, Jun-Young Park, Eui-Nam Huh "Personal Cloud Computing Security Framework" 2010 IEEE Asia-Pacific Services Computing Conference.
  13. Mohammed Achemlal, Sa¨?d Gharout and Chrystel Gaber, "Trusted Platform Module as an Enabler for Security in Cloud Computing" Vol 978-1-4577-0737-7/11/$26. 00 ©2011 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Security Homomorphic Encryption Fuzzy rules.