Information Security in Cloud Computing utilizing Fully Homomorphic Encryption Techniques
K. Sivaraman1, R. Kavitha2, C. Anuratha3
1K.Sivaraman, Department of CSE, Bharath Institute of Higher Education and Research, (Tamil Nadu), India.
2R.Kavitha, Department of CSE, Bharath Institute of Higher Education and Research, (Tamil Nadu), India.
3C.Anuradha, Department of CSE, Bharath Institute of Higher Education and Research, (Tamil Nadu), India.
Manuscript received on 14 September 2019 | Revised Manuscript received on 23 September 2019 | Manuscript Published on 10 October 2019 | PP: 679-683 | Volume-8 Issue-6S2, August 2019 | Retrieval Number: F12510886S219/19©BEIESP | DOI: 10.35940/ijeat.F1251.0886S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Flowed enlisting gives a course to the business to deal with the figuring assets on the web. The term has made over late years, and can be utilized to outline the utilization of a pariah for your capacity and figuring needs.The mechanical improvement of distributed computing has helped the business to develop as well as the wellbeing of information has turned into a noteworthy issue. Numerous encryption procedures are utilized as a part of information security in cloud. They are especially powerful when the information is away state and in transmission state. Be that as it may, in handling state the information must be unscrambled so that the operations can be performed. Once the information is unscrambled it is accessible to the cloud supplier henceforth these customary encryption systems are insufficient to secure the information. The information will be protected if the operations are performed in the decoded information. This can be accomplished if the information is encoded utilizing homomorphic encryption strategies. This paper examines about the homomorphic encryption method, its disadvantages and future improvements. [19],[20],[21]
Keywords: Distributed Computing, Data Security, Encryption, Decryption, Homomorphic Encryption.
Scope of the Article: Cloud Computing