• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Conference/Workshop/Seminar Papers
  • School of Informatics & Innovative Systems
  • View Item
  •   JOOUST IR Home
  • Conference/Workshop/Seminar Papers
  • School of Informatics & Innovative Systems
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Analysis of fully homomorphic encryption schemes in enhancing data security in cloud computation

Thumbnail
View/Open
Omollo _ Analysis of fully homomorphic encryption schemes in enhancing data security in cloud computation.pdf (127.3Kb)
Publication Date
2015-06-24
Author
Omollo, R.
Ongati, Naftali O.
Raburu, George.
Type
Other
Metadata
Show full item record
Abstract/Overview

Cloud computing is an emerging technological paradigm in the field of digital resource management where such in cloud environment, it involves processing critical data hosted under preferred deployment model. A computational requirement on such cloud data is to adequately address security concerns for both cloud users and providers. Fully Homomorphic Encryption (FHE) has been used to introduce computational complexity while processing data in the cloud without compromising its security. Earlier implementations of fully homomorphic encryption scheme have enabled successful operations on such encrypted data without compromising its secret key. However, this scheme introduce computational defect since the encrypted data becomes very large causing heavy burden onto computing assets in question. In this paper, we appreciate this implementation weakness and address it by incorporating a new technique whereby we defined addition- composition operation such that  whereo whereo is a composite function. Our approach not only improves the security requirement on the processed data but also reduces computational overheads, which make it ideal for cloud computation. Again, we are able to demonstrate superiority of our approach against previous variants of fully homomorphic encryption that has been implemented

Subject/Keywords
Cloud computation; Fully homomorphic encryption scheme; Data security, Technique
Further Details

1st JOOUST Scientific Conference

Permalink
http://www.jooust. ac.ke
http://62.24.102.115:8080/xmlui/handle/123456789/183
Collections
  • School of Informatics & Innovative Systems [7]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement