Loading

Homomorphic Encryption – Need of the Hour
Dakshita Sharma1, Purushottam Sharma2, Vikas Deep3
1Dakshita Sharma, Department of Information Technology, Amity University, Noida (Uttar Pradesh), India.
2Dr. Purushottam Sharma, Department of Information Technology, Amity University, Noida (Uttar Pradesh), India.
3Mr. Vikas Deep, Department of Information Technology, Amity University, Noida (Uttar Pradesh), India.
Manuscript received on 16 August 2019 | Revised Manuscript received on 28 August 2019 | Manuscript Published on 06 September 2019 | PP: 748-751 | Volume-8 Issue- 6S, August 2019 | Retrieval Number: F11450886S19/19©BEIESP | DOI: 10.35940/ijeat.F1145.0886S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Every common day the headlines of the newspaper are buzzed with data leaks and mobbing of data. The hackers are considering human just as a moving data. As the technology is advancing, we are more prone to cyber-attacks. With the ease of advancement there are certain cons which are approaching towards us. To protect the individuality of a human being, few governments of different countries have taken a step ahead to demoralize the illegal access to data hence inhibiting security. Homomorphic encryption is the trend or technique by which data can be protected as the encryption is done on the ciphertext. In this paper different types and techniques of homomorphic encryption is discussed. The techniques provide a secure environment for data to run on any application.
Keywords: Hackers, Technology, Cyber-attacks, Security, Homomorphic Encryption, Ciphertext.
Scope of the Article: Encryption Methods and Tools