Security Framework for Cloud Computing using Fragmentation and Homomorphic Encryption
Savita A.1, Vasanth2

1Savita A. Harkude, Associate Professor, Department of ETE, Sir MVIT, Bangalore, (Karnataka) India.
2Dr. Vasanth G., HOD, Department of CSE, Government Engineering College, Mandya, (Karnataka) India.
Manuscript received on November 23, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 1633-1638 | Volume-9 Issue-2, December, 2019. | Retrieval Number:  B3010129219/2019©BEIESP | DOI: 10.35940/ijeat.B3010.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: An invention of cloud computing technology comes with numerous benefits for IT industries and others. The data store in the cloud can be easily shared among stakeholders irrespective of their location, i.e. data availability is very good. Nowadays organizations are switching to cloud platform for storing and sharing data in a decentralized manner. This is significantly reduces the economically burden to the organization. As the data are accessible through network, so major concern is to maintain the data confidentiality. Data breach in any form organization losses their trustworthy, and this affect the reputation of the organization. This is very important to maintain the privacy and security of data all the time. There are so many works has been proposed by many researchers to secure data in the cloud by using various encryption techniques. In this paper, we proposed a security mechanism to maintain confidentiality of data. This method is combination of multiplicative homomorphic encryption algorithms along with vertical fragmentation of data. We have tested our scheme based on crypto delays, communication delays, and query processing delays with an existing work. The results obtained show that our method out-perform the existing work. The results obtained show improvement with the proposed method.
Keywords: Security, Homomorphic-encryption, Cloud computing, Fragmentation, Delay.