Comparative Study of Fully Homomorphic Encryption and Fully Disk Encryption schemes in Cloud Computing
Citation
Akriti Sharma, Nagresh kumar " Implementation of a Low-cost CNC Plotter Using Spare Parts ", International Journal of Engineering Trends and Technology (IJETT), V43(6),340-346 January 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Two encryption schemes come into existence: Fully disk encryption scheme (FDE) and fully homomorphic encryption scheme (FHE). In this paper, comparison is made between the two on certain factors which conclude that fully homomorphic encryption scheme is more reliable and provides more security as compare to fully disk encryption scheme. The main problem with fully disk encryption scheme is key management, key storage, and data aggregation and so on. To solve the problem of key management and key sharing various schemes are proposed in last few years. The various securities are possible in these schemes. The third party auditor is the scheme for key management and key sharing. The third party auditor scheme will be failed if the third party’s security is compromised or third party will be malicious. So, in this paper we have made comparative study between fully Homomorphic Encryption and Fully Disk Encryption schemes used in cloud computing for data security.
References
[1] Bhavna Makhija, VinitKumar Gupta “Enhanced Data Security in Cloud Computing with Third Party Auditor”, International journal of Advanced Research in Computer Science and Software Engineering, 2013.
[2] Dawn Song, Elaine Shi “Cloud Data Protection for the Masses” IEEE Computer Society,2012.
[3] Devan Chen, Hong Zhao “Data Security and Privacy Protection issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, 2012.
[4] Deepanchakaravarthi Purushothaman and Dr. Sunitha Abburu “ An Approach for Data Storage Security in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol.9, Issue2, No 1.,2012.
[5] Simarjeet Kaur “ Cryptography and Encryption In Cloud Computing” VSRD-IJCSIT, Volume 2(3), 2012,242-249, 2012.
[6] Sanjoli Singla, Jasmeet Singh “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013.
[7] Mark D. Ryan , “Cloud Computing for Enterprise Architectures: Concepts, Principles and Approaches”, 2013.
[8] Zvika Brakerski ,Vinod Vaikuntanathan “Effcient Fully Homomorphic Encryption “LWE, 2010.
[9] Sigrun Goluch “The development of homomorphic cryptography”Vienna University of Technology, 2009.
[10] Defence Signals Directorat “Cloud Computing Security Consideration” Cyber Security Operations Centre, 2011.
[11] Ponemom Institute “Encryption in the Cloud ” Thales e-Security, 2009 [12] Anthony T. Velte Toby J. Velte, Ph.D. Robert Elsenpeter, 2010 “Cloud Computing: A practical Approach” 2011.
[13] Fraunhofer Verlag “These curity Of Cloud Storage Services” Fraunhofer Institute for Secure information Technology, 2012.
[14] Ajay Jangra, Renu Bala “Spectrum of Cloud Computing Architecture: Adoption and Avoidance Issues”, International Journal of Computing and Business Research, Volume 2, Issue 2, May 2011.
[15] C. Braun, M. Kunze, J. Nimis, and S. Tai, “Web-based Dynamic IT-Services”,Springer Verlag, Berlin, Heidelberg, 2010.
[16] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing” April 2010.
[17] Kuyoro S. O., Ibikunle F. & Awodele O, “Cloud Computing Security Issues and Challenges”, International Journal of Computer Networks (IJCN), Volume 3, Issue 5, pp 247-255, 2011.
[18] Bhushan Lal Sahu, Rajesh Tiwari, “A Comprehensive study on cloud computing”, Internatioinal Journal Of Advanced Research in Computer Science and Software Engineering,Volume 2,Issue 9,September 2012 .
[19] Ertaul L, Singhal S, Gokay S, “Security challenges in Cloud Computing”, International conference on Security andManagement SAM’10. CSREA Press, Las Vegas, US, pp 36–42,2010.
[20] Grobauer B, Walloschek T, Stocker E, “ Understanding Cloud Computing vulnerabilities”, IEEE Security Privacy, 2011.
Keywords
cloud computing, data storage, FDE, FHE, security, third party auditor.