PRJ 702

Encryption Techniques for Cloud Data Confidentiality

Cloud computing is latest development that provides easy access to high performance computing resources without installation of software. It provides many benefits for its users but it suffers with some security threats. Security of data is one of the top list impediments in the growth of this latest technology.

Cloud security is sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.

A number of variants of the security schemes have been proposed, i.e., most works implement some of these encryption techniques and/or are based on them.

The encryption methods are categorized as-

  • Homomorphic encryption
  • Garbled circuit
  • Functional-encryption scheme

The following are most widely used techniques for encryption-

  • AES (Advanced Encryption Standard)
  • Homomorphic encryption
  • Attribute Based Encryption
  • Proxy re-encryption
  • Hierarchical Identity Based Encryption
  • Identity Based Broadcast Encryption (IBBE)

All the methods will be discussed in details in the coming posts.

 

 

Leave a comment