Sanjay Kumar, Shah Lucky, Saurabh Subham, Syed Abdul Rehman and Jyoti Kiran Mirji


Cloud computing is being the major technology which has been evolved in this era where developing the product and the providing the web services has been enhanced. There are various cloud-based services namely Azure, AWS, google drive and so on. Processing power is more efficient in the cloud environment. But with the launch of cloud services in the cloud environment with the less cost, the privacy of the people is being hindered. Challenges in the cloud computing which need to be rectified and resolved. Here we are trying to resolve one such issues of it’s security by providing a powerful framework namely Homomorphic encryption method where the operation can take place on the cipher text or encrypted data.


Cloud Computing, Security, Framework

Full Text:



Q. Zhang, L. Cheng, and R. Boutaba," Cloud computing: state-of-theart and research challenges," Journal of internet services and applications, vol. I, no. I, pp. 718,2010 [2] B. P. Rimal, E. Choi, and I. Lumb, "A taxonomy and survey of cloud computing systems," lNC,I MS and lDC , pp. 44-51,2 009 [3] C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing," Computers & Electrical Engineering, vol. 39,n o. I, pp. 47-54,2013 [4] J. W. Rittinghouse and J. F. Ransome, Cloud computing: implementation, management, and security. CRC press,2 016 [5] R. H. Weber and R. Weber, Internet of Things. Springer,2010,v ol. 12 [6] P. Mell and T. Grance, "Effectively and securely using the cloud computing paradigm," NIST, Information Technology Laboratory, pp. 304-311,2009 [7] M. Spinola, "An essential guide to possibilities and risks of cloud computing," Retrieved March,v ol. 24, p. 2011,2 009. [8] V. Ratten, "Entrepreneurial and ethical adoption behaviour of cloud computing," The Journal of High Technology Management Research, vol. 23,n o. 2,p p. 155-164,2012. [9] O. Freestone and V. Mitchell, "Generation y attitudes towards ethics and internet-related misbehaviours," Journal of Business Ethics, vol. 54, no. 2, pp. 121128,2004. [10]” A framework of improving cloud security” by Jayachander Surbiryala, Chunlei Li, Chunming Rong Department of Electrical Engineering and Computer Science University of Stavanger, Norway

DOI: https://doi.org/10.26483/ijarcs.v9i0.6239


  • There are currently no refbacks.

Copyright (c) 2018 International Journal of Advanced Research in Computer Science