A hybrid encryption model for secure cloud computing

Atewologun Olumide, Abeer Alsadoon, P. W. C. Prasad, Linh Pham

Research output: Book chapter/Published conference paperConference paperpeer-review

8 Citations (Scopus)

Abstract

Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.
Original languageEnglish
Title of host publicationProceedings of the 2015 Thirteenth International Conference on ICT and Knowledge Engineering
Place of PublicationThailand
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages24-32
Number of pages9
ISBN (Electronic)9781467391900
ISBN (Print)9781467391894
DOIs
Publication statusPublished - 04 Jan 2016
Event13th International Conference on ICT & Knowledge Engineering: ICT & KE 2015 - Siam University , Bangkok, Thailand
Duration: 18 Nov 201520 Nov 2015
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7368460 (Proceedings front matter)

Conference

Conference13th International Conference on ICT & Knowledge Engineering
Country/TerritoryThailand
CityBangkok
Period18/11/1520/11/15
Internet address

Fingerprint

Dive into the research topics of 'A hybrid encryption model for secure cloud computing'. Together they form a unique fingerprint.

Cite this