Repository logo
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • Research Outputs
  • Projects
  • People
  • Statistics
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. A hybrid algorithm for secure cloud computing
 
  • Details
Options

A hybrid algorithm for secure cloud computing

ISSN
17411084
Date Issued
2020-01-01
Author(s)
Das, Debasis
DOI
10.1504/IJWMC.2020.105693
Abstract
Cloud computing is a developing technology that is yet unclear to many security issues. Data in the untrusted clouds can be encrypted using an encryption algorithm. Randomising this data provides more security which can be achieved by padding concept in the cloud. In this paper, the user’s data is encrypted using padding scheme, called Optimal Asymmetric Encryption Padding (OAEP) together with Hybrid Encryption algorithm that is based on RSA (i.e., HERSA), to allow multiple parties to compute a function on their inputs while preserving integrity and confidentiality. The homomorphic encryption is performed on the encrypted data without decrypting it in computationally powerful clouds, and the Secure MultiParty Computation (SMPC) can be used in the cloud to ensure security and privacy of the users. In this paper, we propose a scheme that integrates the Multi-Party Computation (MPC) with homomorphic encryption to allow calculations of encrypted data without decryption. The cryptographic techniques used in our cloud model are described, and the overheads are compared with homomorphic encryption and MPC.
Subjects
  • Cloud computing

  • Homomorphic encryptio...

  • MPC

  • Multi-party computati...

  • Optimal asymmetric en...

Copyright © 2016-2025  Indian Institute of Technology Jodhpur

Developed and Maintaining by S. R. Ranganathan Learning Hub, IIT Jodhpur.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback