SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1010
DATA SECURITY IN CLOUD COMPUTING USING HOMOMORPHIC
ALGORITHAM
Amruta Patil1, Apurva Kirve2, Sayali Nandeshwar3, Swati Taru4
1,2,3,4Dept. of Information Technology, Zeal College of Engineering Research, Narhe, Pune, 411041
---------------------------------------------------------------------***----------------------------------------------------------------------
ABSTRACT: The framework of cloud computing receiving a good deal of attention each in publication and different users. Cloud
computing is that the system of computing solution over the web. Cloud computing services enable people and businesses to use
hardware and computer code technique that area unit control by cloud suppliers at remote locations. The space betweentheuser
and therefore the physical location of his information creates a stopper as a result of this information is accessed by a 3rd party
and this is able to have an effect on the privacy of user information. The mistreatment of ancient secret writing schemes to
encipher the remoted information before transfer to the cloud supplier has been most generallyusedsystemtobridgethissecurity
tittle-tattle. But, the user can got to give the non-public key to the server to decode the info before perform the action needed.
Homomorphic secret writing use to execute computations on encrypted information while not coding. The need of homomorphic
secret writing to encipher the user information in cloud server and conjointly it'll be accustomed execute needed perform on this
encrypted file or information.
Keywords: cloud computing, Homomorphic encryption, Key generation, OTP.
1. INTRODUCTION:
Cloud Computing has seem as a vital paradigm thathasattracttidyattentionineachbusinessandworld.CloudComputinghave
totally different names referred to as as "outsourcing" and "server hosting." however the less action taken by the processors
used, fine net connections and therefore the enthusiastically prices of the substances used, don't enable the employment of
facility and storage areas. However, current advances in resent technology via virtualization paved the method for these
functions with quicker process.
Cloud Computing security challenges associated it’s additionally a drawback to several researchers; very first thing was to
specialize in security that is that the biggest entity of organizations that area unit considering a proceed to the cloud. The
employment of cloud computing guide loads of benefits together with decreases prices, simple to use and provisioning of
functions. The primary real use of the tactic of cloud computing was in 2002 by the corporate Amazon net Services, once it
borrow its resources to corporations throughout interval off on demand.
Many users use the cloud daily while not knowing. A bit like altogether versions of email and access to the applications that
don't seem to be part put in on the native computer as paint, Microsoft Word. This use is finished due to Ethernet, however
customers might not understand the situation of the servers that keep their emails and hosting the supply file of the
applications that user uses. The functions offered by the Cloud Computing suppliers, come back from giant digital stations
referred to as Datacenters, victimization wayssupported virtualization.Thevirtualizationisall thetechnical substancesand/or
software system which will run on one machine multiple operational systems and/or multiple applications, one by one from
one another, as if they were performing on unrelated physical machines. Virtualization and consolidation will simply the
management of the server’s park, by decreasing the amount of systems to be maintained by optimizing the employment of
resources and enabling high accessibility. However the adoption and therefore the passage to the Cloud Computing remodel
provided that the protection is ensured. The way to warranty a higher file security and additionally however will we have a
tendency to keep the user non-public info confidential? Therearea unit2mainqueriesthatgifta challengetoCloudComputing
suppliers.
2. PROBLEM DEFINITION AND OBJECTIVE:
Industries start switching from local to cloud server because cloud service providers are more relating and provides large
amount of storage space. However, such great advantages, problem of data security and privacy comestowardscompany.The
data outsourced by various data users may get harmed by attacker, malware or threats.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1011
3. LITERATURE SURVEY
3.1 Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile
Cloud Computing:
In this paper, secret writing perform like RSA and Daffier playwright cryptosystem proves to be useless against the attacks
done by quantum laptop. Hence, Homomorphic Signaturethemeispresentalongside theIdentityManagement(IDM)usedinto
the mobile cloud computing so as to trace this issue by applying implicit verificationmethodologytoclassificationbetweenthe
real and non-genuine persons that permits system to manifest the users properly. The small print of the system are more
examine later during this paper, wherever the user are genuine with IDM as development and no secret is employed
throughout the verification method, permitting the users to be safely genuine at the tip of the program in execution.
3.2 Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm:
In this survey we've make a case for concerning new security system victimization interchangeablekeycryptographyruleand
steganography .In this planned framework AES, blowfish, RC6 and bandeau algorithms are accustomedstyleblock wisesafety
to file. All rule key size is 128 bit’s steganography system is introduced for key infosafety.Keyinfocontributesthata partoffile
is encrypted victimization by that rule and key .File is collapse into 8 components. Every and each a part of information is
encrypted victimization totally different rule. All components of file are encrypted sequins with the assistance of
multithreading functions. Encoding Keys are inserted into cowl image victimization LSB technique. Steno image is transfer to
valid receiver victimization email. For information coding purpose reverse method of encoding is applied.
3.3 Secure Cloud Computing Algorithm Using Homomorphic Encryption And Multi Party Computation:
In this survey, the user’s file is encrypted victimization artifact techniques, referred to as optimum uneven encoding artifact
(OAEP) along with Hybrid encoding algorithmic program that's gift on RSA (i.e., HE-RSA), so as to permit multiple parties to
transmit a perform on their inputs whereas protective Integrity and Confidentiality. The Homomorphic Encryption (HE) is
employed on the encrypted information while not decrypting it in computationally powerful clouds andalsotheSecureMulti-
Party Computation (SMPC) will be utilized in the cloud to make sure security and privacy of the purchasers. During thispaper,
we've planned a system that integrates the multi-party computation with homomorphic encoding to permit mathematical
calculations of encrypted information while not secret writing. The cryptologic system utilized in our cloud model square
measure represented and also the overheads square measure compared with Homomorphic encoding and Multi-Party
Computation.
4. PROPOSED SYSTEM ARCHITECTURE:
Fig 1. Proposed System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1012
When the information transferred to the Cloud server we have a tendency to use normal coding ways to securethe operations
and also the storage of the information. Our basic conception is to inscribe the information beforesendittotheCloudsupplier.
However the last one needed to rewrite files at each operate acting. knowledge the info the information} owner canhavetobe
compelled to give the non-public key to the server (Cloud provider) to rewrite data before execute the calculations needed,
which could have an effect on the confidentiality and privacy of knowledge hold on within the Cloud. This design proposing
associate degree supply of a operate to execute operations on encrypted file while not decrypting them, which can use an
equivalent outputs once calculations as if we've got worked directly on the data.
Homomorphic coding wont to perform operations on encrypted information while not knowing the non-public key (without
decryption), the information owner is that the solely holder of the key key. After werewritetheoutputsofanyfunctions,it'san
equivalent as if we have a tendency to have borrowed out the calculation on the unused information.
5. CONCLUSIONS:
To summarize, the work provides a model of a framework which will be utilized by organizations to safeguard and manage
their knowledge hold on over untrusted public clouds. As a part of the work the likelihood of victimization delta encryption
ideas beside homomorphic cryptography theme with additive homomorphy to update encrypted files, rather than sending
entire encrypted versions every time once associate degree update, was explored. Below the take a look at atmosphere, the
developed model has delivered promising performance results as compared to alternative common solutions. Therefore the
planned approach may be thought-about to be used in universe situations.
The security topic square measure a giant downside for cloud computing development. To keep up the privacy of his file, the
user should encipher knowledge before being transfer to the cloud. Cloud computing security supported homomorphic
cryptography strategy, as a result of these strategy permit to perform computations on encrypted knowledge while not the
employment of the key key. partly Homomorphic cryptography (PHE) like RSA and Paillier functions square measure
inadequate to secure cloud computing as a result of these conspire permit to perform only 1 operation (either addition or
multiplication) on the encrypted knowledge of user.
REFERENCES
1. P. Mell, T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, U. S.
Department of Commerce, (2011)
2. K. Lauter, M. Naehrig, V. Vaikuntanathan, “Can Homomorphic Encryption be Practical?”, CCSW' 11, Chicago, llinois,
USA, pp. 113–124, (2011).
3. Craig Gentry, “Fully homomorphic encryption using ideal lattice”, in Proceedings of STOC’09, (2009).
4. M. van Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, “Fully homomorphic encryptionovertheIntegers”,inProceedings
of Advances in Cryptology, EUROCRYPT’10, pages 24–43, 2010.
5. Craig Gentry, “Computing arbitrary functions of encrypted data”, Communicationsof TheACM,53(3):97-105,(2010).
6. J. Li, D. Song, S. Chen, X. Lu, “A Simple Fully Homomorphic Encryption Scheme Available in Cloud Computing”, In
Proceeding of IEEE, (2012).
7. Baohua Chen, Na Zhao, “Fully Homomorphic Encryption Application in Cloud Computing”, in Wavelet Active Media
Technology and Information Processing (ICCWAMTIP), 11th International Computer Conference, (2014).

More Related Content

PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
Paper id 27201448
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PDF
Secure Cloud Environment Using RSA Algorithm
PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
PDF
Fog computing a new concept to minimize the attacks and to provide security i...
PDF
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Secure Cloud Data Using Attribute Based Encryption
Paper id 27201448
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Secure Cloud Environment Using RSA Algorithm
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET - Multimedia Security on Cloud Computing using Cryptography
Fog computing a new concept to minimize the attacks and to provide security i...
IRJET- Simultaneous ammunition for the multi-cloud computing simulation

What's hot (20)

PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
PDF
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
PDF
IRJET- Secure File Storage on Cloud using Cryptography
PDF
IJARCCE 20
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
PDF
IRJET- Storage Security in Cloud Computing
PDF
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
PDF
Big data security_issues_research_paper
PDF
Ijarcet vol-2-issue-4-1405-1409
PDF
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PDF
Kp3419221926
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
Improving Efficiency of Security in Multi-Cloud
PDF
Cloud Data Security using Elliptic Curve Cryptography
PDF
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
PDF
Cloud Auditing With Zero Knowledge Privacy
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IRJET- Secure File Storage on Cloud using Cryptography
IJARCCE 20
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
IRJET- Storage Security in Cloud Computing
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
Big data security_issues_research_paper
Ijarcet vol-2-issue-4-1405-1409
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Kp3419221926
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
Improving Efficiency of Security in Multi-Cloud
Cloud Data Security using Elliptic Curve Cryptography
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
Cloud Auditing With Zero Knowledge Privacy
Ad

Similar to IRJET - Data Security in Cloud Computing using Homomorphic Algoritham (20)

PDF
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
PDF
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
PDF
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
PDF
Homomorphic encryption algorithms and schemes for secure computations in the ...
PDF
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
PDF
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
DOCX
Cloud computing term paper
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
PDF
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
PDF
IRJET- Secure Data Protection in Cloud Computing
PDF
5.[40 44]enhancing security in cloud computing
PDF
5.[40 44]enhancing security in cloud computing
PDF
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
PDF
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
DOCX
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
DOCX
Harnessing the cloud for securely outsourcing large
PDF
Data security framework for cloud computing networks
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Homomorphic encryption algorithms and schemes for secure computations in the ...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Cloud computing term paper
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET- Secure Data Protection in Cloud Computing
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
Harnessing the cloud for securely outsourcing large
Data security framework for cloud computing networks
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPT
Project quality management in manufacturing
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Mechanical Engineering MATERIALS Selection
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Sustainable Sites - Green Building Construction
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Well-logging-methods_new................
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Project quality management in manufacturing
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mechanical Engineering MATERIALS Selection
III.4.1.2_The_Space_Environment.p pdffdf
Internet of Things (IOT) - A guide to understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
additive manufacturing of ss316l using mig welding
Sustainable Sites - Green Building Construction
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
OOP with Java - Java Introduction (Basics)
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
R24 SURVEYING LAB MANUAL for civil enggi
Fundamentals of safety and accident prevention -final (1).pptx
CH1 Production IntroductoryConcepts.pptx
Well-logging-methods_new................

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1010 DATA SECURITY IN CLOUD COMPUTING USING HOMOMORPHIC ALGORITHAM Amruta Patil1, Apurva Kirve2, Sayali Nandeshwar3, Swati Taru4 1,2,3,4Dept. of Information Technology, Zeal College of Engineering Research, Narhe, Pune, 411041 ---------------------------------------------------------------------***---------------------------------------------------------------------- ABSTRACT: The framework of cloud computing receiving a good deal of attention each in publication and different users. Cloud computing is that the system of computing solution over the web. Cloud computing services enable people and businesses to use hardware and computer code technique that area unit control by cloud suppliers at remote locations. The space betweentheuser and therefore the physical location of his information creates a stopper as a result of this information is accessed by a 3rd party and this is able to have an effect on the privacy of user information. The mistreatment of ancient secret writing schemes to encipher the remoted information before transfer to the cloud supplier has been most generallyusedsystemtobridgethissecurity tittle-tattle. But, the user can got to give the non-public key to the server to decode the info before perform the action needed. Homomorphic secret writing use to execute computations on encrypted information while not coding. The need of homomorphic secret writing to encipher the user information in cloud server and conjointly it'll be accustomed execute needed perform on this encrypted file or information. Keywords: cloud computing, Homomorphic encryption, Key generation, OTP. 1. INTRODUCTION: Cloud Computing has seem as a vital paradigm thathasattracttidyattentionineachbusinessandworld.CloudComputinghave totally different names referred to as as "outsourcing" and "server hosting." however the less action taken by the processors used, fine net connections and therefore the enthusiastically prices of the substances used, don't enable the employment of facility and storage areas. However, current advances in resent technology via virtualization paved the method for these functions with quicker process. Cloud Computing security challenges associated it’s additionally a drawback to several researchers; very first thing was to specialize in security that is that the biggest entity of organizations that area unit considering a proceed to the cloud. The employment of cloud computing guide loads of benefits together with decreases prices, simple to use and provisioning of functions. The primary real use of the tactic of cloud computing was in 2002 by the corporate Amazon net Services, once it borrow its resources to corporations throughout interval off on demand. Many users use the cloud daily while not knowing. A bit like altogether versions of email and access to the applications that don't seem to be part put in on the native computer as paint, Microsoft Word. This use is finished due to Ethernet, however customers might not understand the situation of the servers that keep their emails and hosting the supply file of the applications that user uses. The functions offered by the Cloud Computing suppliers, come back from giant digital stations referred to as Datacenters, victimization wayssupported virtualization.Thevirtualizationisall thetechnical substancesand/or software system which will run on one machine multiple operational systems and/or multiple applications, one by one from one another, as if they were performing on unrelated physical machines. Virtualization and consolidation will simply the management of the server’s park, by decreasing the amount of systems to be maintained by optimizing the employment of resources and enabling high accessibility. However the adoption and therefore the passage to the Cloud Computing remodel provided that the protection is ensured. The way to warranty a higher file security and additionally however will we have a tendency to keep the user non-public info confidential? Therearea unit2mainqueriesthatgifta challengetoCloudComputing suppliers. 2. PROBLEM DEFINITION AND OBJECTIVE: Industries start switching from local to cloud server because cloud service providers are more relating and provides large amount of storage space. However, such great advantages, problem of data security and privacy comestowardscompany.The data outsourced by various data users may get harmed by attacker, malware or threats.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1011 3. LITERATURE SURVEY 3.1 Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile Cloud Computing: In this paper, secret writing perform like RSA and Daffier playwright cryptosystem proves to be useless against the attacks done by quantum laptop. Hence, Homomorphic Signaturethemeispresentalongside theIdentityManagement(IDM)usedinto the mobile cloud computing so as to trace this issue by applying implicit verificationmethodologytoclassificationbetweenthe real and non-genuine persons that permits system to manifest the users properly. The small print of the system are more examine later during this paper, wherever the user are genuine with IDM as development and no secret is employed throughout the verification method, permitting the users to be safely genuine at the tip of the program in execution. 3.2 Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm: In this survey we've make a case for concerning new security system victimization interchangeablekeycryptographyruleand steganography .In this planned framework AES, blowfish, RC6 and bandeau algorithms are accustomedstyleblock wisesafety to file. All rule key size is 128 bit’s steganography system is introduced for key infosafety.Keyinfocontributesthata partoffile is encrypted victimization by that rule and key .File is collapse into 8 components. Every and each a part of information is encrypted victimization totally different rule. All components of file are encrypted sequins with the assistance of multithreading functions. Encoding Keys are inserted into cowl image victimization LSB technique. Steno image is transfer to valid receiver victimization email. For information coding purpose reverse method of encoding is applied. 3.3 Secure Cloud Computing Algorithm Using Homomorphic Encryption And Multi Party Computation: In this survey, the user’s file is encrypted victimization artifact techniques, referred to as optimum uneven encoding artifact (OAEP) along with Hybrid encoding algorithmic program that's gift on RSA (i.e., HE-RSA), so as to permit multiple parties to transmit a perform on their inputs whereas protective Integrity and Confidentiality. The Homomorphic Encryption (HE) is employed on the encrypted information while not decrypting it in computationally powerful clouds andalsotheSecureMulti- Party Computation (SMPC) will be utilized in the cloud to make sure security and privacy of the purchasers. During thispaper, we've planned a system that integrates the multi-party computation with homomorphic encoding to permit mathematical calculations of encrypted information while not secret writing. The cryptologic system utilized in our cloud model square measure represented and also the overheads square measure compared with Homomorphic encoding and Multi-Party Computation. 4. PROPOSED SYSTEM ARCHITECTURE: Fig 1. Proposed System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1012 When the information transferred to the Cloud server we have a tendency to use normal coding ways to securethe operations and also the storage of the information. Our basic conception is to inscribe the information beforesendittotheCloudsupplier. However the last one needed to rewrite files at each operate acting. knowledge the info the information} owner canhavetobe compelled to give the non-public key to the server (Cloud provider) to rewrite data before execute the calculations needed, which could have an effect on the confidentiality and privacy of knowledge hold on within the Cloud. This design proposing associate degree supply of a operate to execute operations on encrypted file while not decrypting them, which can use an equivalent outputs once calculations as if we've got worked directly on the data. Homomorphic coding wont to perform operations on encrypted information while not knowing the non-public key (without decryption), the information owner is that the solely holder of the key key. After werewritetheoutputsofanyfunctions,it'san equivalent as if we have a tendency to have borrowed out the calculation on the unused information. 5. CONCLUSIONS: To summarize, the work provides a model of a framework which will be utilized by organizations to safeguard and manage their knowledge hold on over untrusted public clouds. As a part of the work the likelihood of victimization delta encryption ideas beside homomorphic cryptography theme with additive homomorphy to update encrypted files, rather than sending entire encrypted versions every time once associate degree update, was explored. Below the take a look at atmosphere, the developed model has delivered promising performance results as compared to alternative common solutions. Therefore the planned approach may be thought-about to be used in universe situations. The security topic square measure a giant downside for cloud computing development. To keep up the privacy of his file, the user should encipher knowledge before being transfer to the cloud. Cloud computing security supported homomorphic cryptography strategy, as a result of these strategy permit to perform computations on encrypted knowledge while not the employment of the key key. partly Homomorphic cryptography (PHE) like RSA and Paillier functions square measure inadequate to secure cloud computing as a result of these conspire permit to perform only 1 operation (either addition or multiplication) on the encrypted knowledge of user. REFERENCES 1. P. Mell, T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, U. S. Department of Commerce, (2011) 2. K. Lauter, M. Naehrig, V. Vaikuntanathan, “Can Homomorphic Encryption be Practical?”, CCSW' 11, Chicago, llinois, USA, pp. 113–124, (2011). 3. Craig Gentry, “Fully homomorphic encryption using ideal lattice”, in Proceedings of STOC’09, (2009). 4. M. van Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, “Fully homomorphic encryptionovertheIntegers”,inProceedings of Advances in Cryptology, EUROCRYPT’10, pages 24–43, 2010. 5. Craig Gentry, “Computing arbitrary functions of encrypted data”, Communicationsof TheACM,53(3):97-105,(2010). 6. J. Li, D. Song, S. Chen, X. Lu, “A Simple Fully Homomorphic Encryption Scheme Available in Cloud Computing”, In Proceeding of IEEE, (2012). 7. Baohua Chen, Na Zhao, “Fully Homomorphic Encryption Application in Cloud Computing”, in Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 11th International Computer Conference, (2014).