3 research outputs found

    From cloud computing security towards homomorphic encryption: A comprehensive review

    Get PDF
    “Cloud computing” is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts with a primary focus on the cloud computing security field, its top threats, and the protection against each one of them. Data security/privacy in the cloud environment is also discussed and homomorphic encryption (HE) was highlighted as a popular technique used to preserve the privacy of sensitive data in many applications of cloud computing. The article aimed to provide an adequate overview of both researchers and practitioners already working in the field of cloud computing security, and for those new in the field who are not yet fully equipped to understand the detailed and complex technical aspects of cloud computing

    The Two secured Factors of Authentication

    Get PDF
    One of the popular challenges that faces the Cloud Computing is the authentication problem. Authentication is a mechanism to establish proof of identities to get access of information in the system. There are several solutions to overcome this issue that it can be gathered in three authentication mechanisms which lead to a multifactorial authentication schema. The multi factor is proposed in this paper confirms the user's identity without sending it to the cloud server, which will gain our solution more security and fast response over other solutions that depend on sending the user identity to the server to be authenticated. The User's credentials have never exchanged with the server, it is only saved in the user's mind. We present an efficient authentication schema which based on two authentication factors, the first is the password-based authentication, which is processed in the user's machine, and the second is the biometric-based authentication which adds more secure factors to the authentication process. We use the Elgamal Elliptic Curve Cryptosystem and the symmetric encryption to overcome the security threads on the authentication process. Furthermore; we use the 3D face image as a second challenge response factor in our proposed algorithm. In addition, to save the bandwidth and computation, we use a mobile agent to pass the first factor of the authentication code to be executed in the client machine, and let the second factor to be executed in the cloud server

    A review of cloud security based on cryptographic mechanisms

    Get PDF
    Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access their personal files from any device provided with Internet services such technology offers even more applications to be utilized without installation. This paper presents a review of basic security challenges consisting of traditional security issues. It also discusses the additional challenges that take place as a result of using cloud computing model by providers and users of cloud systems. Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage
    corecore