You are here

Cloud Computing Security Solution Based on GRC Method and Fully Homomorphic Encryption Algorithm in a Private Cloud

Journal Name:

Publication Year:

Abstract (2. Language): 
This article, by presenting a security strategy for cloud computing used the GRC method, analyzes the different sections of this approach and classification to create security policies and frameworks; And due to the importance of the security and the speed with each other, it used symmetric, homomorphic encryption algorithms, with the MORE approach; The method introduced in this article examined information when sending from the source, during the exchange, calculation of big data and storage, with the speed and security in the private cloud.
149
153

REFERENCES

References: 

[1] F. S. Al-Anzi, S. Kr. Yadav and J. Soni, “Cloud computing: Security model comprising governance, risk management and compliance,” IEEE International Conference on Data Mining and Intelligent Computing (ICDMIC), India, New Delhi, November 2014. doi: 10.1109/ICDMIC.2014.6954232
[2] A. Malekian and A. Zakeralhosseini, Data security, 6rd ed., Tehran: Nass, 2015, pp. 20-21.
[3] M. Iorga and A. Karmel, “Managing Risk in a Cloud Ecosystem,” IEEE Cloud Computing Journal, vol. 2, pp. 51-57, Nov-Dec 2015. doi: 10.1109/MCC.2015.122
[4] Merriam-Webster dictionary, (https://www.merriam-webster.com/dictionary/homomorphism).
[5] M. Ogburn, C. Turner and P. Dahal, “Homomorphic Encryption,” Elsevier on Procedia Computer Science, vol.20, pp. 502-509, November 2013. https://doi.org/10.1016/j.procs.2013.09.310
[6] Q. Meng and Ch. Gong, “Research of cloud computing security in digital library,” 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), November 2013. doi: 10.1109/ICIII.2013.6703173

Thank you for copying data from http://www.arastirmax.com