dc.contributor.author | Omollo, R. | |
dc.contributor.author | Ongati, Naftali O. | |
dc.contributor.author | Raburu, George. | |
dc.date.accessioned | 2016-11-16T09:09:40Z | |
dc.date.available | 2016-11-16T09:09:40Z | |
dc.date.issued | 2015-06-24 | |
dc.identifier.uri | http://www.jooust. ac.ke | |
dc.identifier.uri | http://62.24.102.115:8080/xmlui/handle/123456789/183 | |
dc.description | 1st JOOUST Scientific Conference | en_US |
dc.description.abstract | Cloud computing is an emerging technological paradigm in the field of digital resource management where such in cloud environment, it involves processing critical data hosted under preferred deployment model. A computational requirement on such cloud data is to adequately address security concerns for both cloud users and providers. Fully Homomorphic Encryption (FHE) has been used to introduce computational complexity while processing data in the cloud without compromising its security. Earlier implementations of fully homomorphic encryption scheme have enabled successful operations on such encrypted data without compromising its secret key. However, this scheme introduce computational defect since the encrypted data becomes very large causing heavy burden onto computing assets in question. In this paper, we appreciate this implementation weakness and address it by incorporating a new technique whereby we defined addition- composition operation such that whereo whereo is a composite function. Our approach not only improves the security requirement on the processed data but also reduces computational overheads, which make it ideal for cloud computation. Again, we are able to demonstrate superiority of our approach against previous variants of fully homomorphic encryption that has been implemented | en_US |
dc.description.sponsorship | JOOUST | en_US |
dc.language.iso | en | en_US |
dc.subject | Cloud computation | en_US |
dc.subject | Fully homomorphic encryption scheme | en_US |
dc.subject | Data security, Technique | en_US |
dc.title | Analysis of fully homomorphic encryption schemes in enhancing data security in cloud computation | en_US |
dc.type | Other | en_US |