A hybrid encryption model for secure cloud computing

Research output: Book chapter/Published conference paperConference paperpeer-review

10 Citations (Scopus)


Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.
Original languageEnglish
Title of host publicationProceedings of the 2015 thirteenth international conference on ICT and knowledge engineering
EditorsAmira M. Idrees, Ahmed Bakr Ibrahim
Place of PublicationThailand
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages8
ISBN (Electronic)9781467391900
ISBN (Print)9781467391894, 9781467391917
Publication statusPublished - 04 Jan 2016
Event2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015) - Siam University , Bangkok, Thailand
Duration: 18 Nov 201520 Nov 2015
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7368460 (Proceedings front matter)


Conference2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)
Internet address


Dive into the research topics of 'A hybrid encryption model for secure cloud computing'. Together they form a unique fingerprint.

Cite this