You are here

Improvement GRC Security Solution Using SFHE-PORE Algorithm in Cloud Computing

Journal Name:

Publication Year:

Abstract (2. Language): 
One of the most important subjects in technologies, According to the researchers of computer science and information technology is cloud computing, it has more benefits that included: Facilitating resource management, better availability, Reducing costs, In addition to, there are more problems that one of these is Maintaining security dynamically; To create dynamic security, this requires for a comprehensive plan; In this paper introduced and survived of Strategic approach of GRC; Planning and providing a safe and fast solution are associated parts of this method for data exchanging and data making storage; Therefore, We introduced the best methods for encryption calculations by presenting and examining a symmetric fully homomorphic encryption algorithm; finally, The best method is presented by a comparative evaluation of performing of these methods, The proposed method has a good speed in clouds with high traffic.
84
89

REFERENCES

References: 

[1] F. S. Al-Anzi, S. Kr. Yadav and J. Soni, “Cloud computing: Security model comprising governance, risk management and compliance,” IEEE International Conference on Data Mining and Intelligent Computing (ICDMIC), India, New Delhi, November 2014. doi: 10.1109/ICDMIC.2014.6954232
[2] A. Malekian and A. Zakeralhosseini, Data security, 6rd ed., Tehran: Nass, 2015, pp. 20-21.
[3] M. Iorga and A. Karmel, “Managing Risk in a Cloud Ecosystem,” IEEE Cloud Computing Journal, vol. 2, pp. 51-57, Nov-Dec 2015. doi: 10.1109/MCC.2015.122[4] Merriam-Webster dictionary, (https://www.merriam-webster.com/dictionary/homomorphism).
[5] M. Ogburn, C. Turner and P. Dahal, “Homomorphic Encryption,” Elsevier on Procedia Computer Science, vol.20, pp. 502-509, November 2013. https://doi.org/10.1016/j.procs.2013.09.310
[6] Q. Meng and Ch. Gong, “Research of cloud computing security in digital library,” 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), November 2013. doi: 10.1109/ICIII.2013.6703173
[7] F. Zhao, Ch. Li, Ch. F. Liu, “A cloud computing security solution based on fully homomorphic encryption,” IEEE 16th International Conference on Advanced Communication Technology, South Korea, Pyeongchang, March 2014. doi: 10.1109/ICACT.2014.6779008.
[8] J. Li and L.Wang, “Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings,” International Association for Cryptologic Research (IACR) Cryptology ePrint Archive, Oct 2015. http://ia.cr/2015/641
[9] M. Van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan, “Fully Homomorphic Encryption over the Integers,” Springer: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 6110, pp. 24-43. 2010. https://link.springer.com/chapter/10.1007/978-3-642-13190-5_2
[10] K. Hariss, H. Noura and A. E. Samhat, “Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications,” Elsevier on Journal of Information Security and Applications, vol. 34, pp. 233-242. June 2017.
[11] A. Kipnis and E. Hibshoosh, “Efficient Methods for Practical Fully-Homomorphic Symmetric-key Encryption, Randomization, and Verification,” International Association for Cryptologic Research (IACR) Cryptology ePrint Archive, Nov 2012.
http://ia.cr/2012/637

Thank you for copying data from http://www.arastirmax.com