International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 185 - Number 38 |
Year of Publication: 2023 |
Authors: Dennis Redeemer Korda, Eric Ayintareba Akolgo, Emmanuel Oteng Dapaah, Dickson Kodzo Mawuli Hodowu |
10.5120/ijca2023923186 |
Dennis Redeemer Korda, Eric Ayintareba Akolgo, Emmanuel Oteng Dapaah, Dickson Kodzo Mawuli Hodowu . Securing Data in Clouds using the SDC Algorithm: Current Trends and Research Directions. International Journal of Computer Applications. 185, 38 ( Nov 2023), 23-28. DOI=10.5120/ijca2023923186
The rapid evolution of cloud computing has brought forth an urgent need to ensure the security and confidentiality of data stored in the cloud. Access control methods, while useful, may not provide sufficient protection. As a viable alternative, data encryption has emerged as a robust solution, empowering organizations to encode data before transferring it to the cloud. Within the realm of encryption algorithms, homomorphic encryption stands out for its unique capabilities. By allowing computations on ciphertext data without revealing the original information, it addresses both confidentiality and data processing needs in cloud computing. This review delves into the critical topic of cloud computing security with a focus on safeguarding data privacy using homomorphic encryption. Various encryption algorithms are explored, including the renowned Gentry cryptosystem, DGHV algorithm, Gen10, SDC algorithm, and the cutting-edge GSW algorithm. Homomorphic encryption, which permits computations on ciphertexts, is dissected, distinguishing between additive and multiplicative homomorphisms. Notably, fully homomorphic encryption, a groundbreaking concept, supports both addition and multiplication operations on ciphertexts. The inception of fully homomorphic encryption by Gentry marked a pivotal moment in the field, enabling computations on encrypted data. Subsequent research expanded upon this concept, introducing variations and practical implementations. One such implementation aims to bridge the gap between cloud computing and data confidentiality, offering a glimpse into the future of secure cloud computing. This paper sheds light on the key homomorphic encryption algorithms utilized in safeguarding cloud computing data, providing a comprehensive overview of their features and potential applications.