##plugins.themes.academic_pro.article.main##

Abstract

The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key management, key storage and data aggregation. To solve the problem of key management and key sharing various schemes are proposed in last few years. The third party auditor is the scheme for key management and key sharing. The third party auditor scheme will be failed if the third party’s security is compromised or third party will be malicious. Cloud computing is very latest technology which is widely used in these days. There are some security threats in this network. The proposed scheme is used to provide security to the cloud so that attacker will unable to hack the information using Diffie- Hellman key exchange protocol. . In Diffie -Hellman algorithm, there is no provision for the storage or exchange of the PIN key. So it protects network devices from attacks.

Keywords: Cloud computing, IaaS, PaaS, SaaS, Diffie Hellman key exchange algorithm.

##plugins.themes.academic_pro.article.details##

Author Biography

Preeti Ahuja, PUNJABI UNIVERSITY REGIONAL CENTER FOR INFORMATION TECHNOLOGY AND MANAGEMENT, MOHALI, PUNJAB,INDIA

M.TECH STUDENT,COMPUTER SCIENCE DEPARTMENT
How to Cite
Ahuja, P. (2014). To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing. International Journal of Emerging Trends in Science and Technology, 1(06). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/274

References

[1] Feng Zhao, Chao Li, Chun Feng Liu, “A cloud computing security solution based on fully homomorphic encryption,” International Conference on Advanced Computing Technology, pp. 485–488, 2014.
[2] Suneel Wattal and Ajay Kumar, “Cloud Computing - an Emerging Trend in Information Technology,” International Conference on Issues and Challenges in Intelligent Computing Techniques, pp. 168-173, 2014.
[3] Rajkumar Chalse, Ashwin Selokar and Arun Katara, “A New Technique of Data Integrity for Analysis of the Cloud Computing Security,” 5th International Conference on Computational Intelligence and Communication Networks, pp. 469-473, 2013.
[4] M. Sugumaran, BalaMurugan. B and D. Kamalraj, “An Architecture for Data Security in Cloud Computing,” World Congress on Computing and Communication Technologies, pp. 252-255, 2014.
[5] Eman M.Mohamed and Hatem S. Abdelkader, “Enhanced Data Security Model for Cloud Computing,” 8th International Conference on Informatics and Systems, 2012.
[6] K. Rubin and A. Silverberg, A report on Wiles’ Cambridge lectures, Bulletin of the American Mathematical Society, pp. 15-38, 1994.
[7] Kou-Min Cheng, Ting-Yi Chang, and Jung-Wen Lo, “Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol,” International Journal of Network Security, vol. 11, no.1, pp.55, 2010.