Professional Documents
Culture Documents
Abstract—A scenario in which the network can be accessed is connected even when the texts are not connected. The
on- demand so that the resources available within it can be technique through which the data is encrypted in such a
used in convenient manner is known as cloud computing. It is
also possible for the user to store the data and have access to manner that a query- specific token is used for querying it
various types of services. Depending upon the usage of is known as structured encryption. The knowledge from
resources, the users have to pay. Several data encryption secret key is used in order to generate this query-specific
techniques have been proposed by researchers to ensure the token [3]. Also, the information related to query or data is
security of important data available in the cloud scenarios.
This study focuses on reviewing full disk encryption (FDE) as not revealed by the query process. Therefore, the major
well as the fully homomorphic encryption (FHE) techniques. It concern here is the representation of ‘f’ function which can
is seen through the studied evaluations that the efficiency of be different for various schemes.
FDE is less as compared to FHE. However, the reliability of
FHE is reduced due to the key management and sharing issues There are, several security and maintenance related
faced in this technique. challenges being faced by the technologies today which
Keywords— Cloud computing, fully homomorphic cannot be resolved by applying the FDE and FHE. This can
encryption,fully disk encryption be understood more clearly by highlighting the differences
that exist amongst them such as:
I. INTRODUCTION
Key management and trust: The keys might be available
A scenario in which the resources can be accessed from within the cloud platform or near to the physical drive in
a shared pool as per the demand and convenience of user is case of FDE. The key management process does not
known as cloud computing. The management required for include the cloud application user. Even though the data of
these resources is very less. There are several clients and user is encrypted on the physical disk, any layer present
organizations which store their private data within the below it can access it at any time. Thus, the access of data
clouds. This data can be modified or retrieved by the users to unauthorized users of online attacks is not prevented by
as per their requirements [1]. The “pay per user” method is FDE approach. The data cannot be learnt or leaked easily
used here in order to provide services to the cloud users. through the untrusted applications when FHE is applied.
This means that the users only need to pay for the services The FHE encryption keys are owned and managed by the
they access for a certain period of time. Cloud computing is users. However, without seeing the data actually,
basically a technology through which the wide range of computations can be performed on encrypted forms by the
applications can be accessed by users that have different applications [4].
topologies. The specialization for each topology is
different. It is possible to have access to any user’s account Sharing: For the cloud applications, another important
without its knowledge through the cloud service providers feature to be considered is collaboration. To make it possible
provided in this technology. However, huge data might be for the owner to share one or more data objects selectively
lost here which cannot be handled by the user. Several with other users, it is important to include fine- grained
security problems are being faced within cloud computing access control. Since the access control granularity and key
and depending upon certain criterions these problems can granularity are not lined up, it is important for a user to
be categorized. In order to provide security to the completely rely on the cloud provider for providing the right
information available within clouds, different types of data access control in the presence of FDE. There is no exact way
security approaches have been developed over the years by defined for providing access control yet, since the
researchers. The researchers have been discussing over the encryption keys are managed by the user or third party cloud
best possible solutions to be provided within certain provider in case of FHE. The key management can be
scenarios [2]. The encryption technique in which the defined on a per- data object granularity basis such that the
corresponding algebraic function is used to handle plain fine-grained encryption-based access control can be
and cipher texts is known as homomorphic encryption. The provided. It is important for the objects to be encrypted
algebraic operation which is applied on both of these texts
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:59:57 UTC from IEEE Xplore. Restrictions apply.
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
within similar public key for supporting homomorphic
operations within the multiple encrypted objects [5]. Deyan Chen et.al, provided a study related to the
Performance: The symmetric encryption of FDE can be various issues being faced by the data when it crosses the
performed at the complete bandwidth of disk due to which data life cycle in terms of maintaining its security and
the system slows down its processing. Before being capable privacy [9]. The future research of the data security and
enough to deploy at a scale, it is important to enhance the privacy protection problems being faced in cloud is also
performance of FHE. presented here. There is still the need to solve various
problems of cloud computing even though it provides
Ease of development: There is no impact of FDE on the several benefits. There is a revenue estimation conducted
development of application since it is hidden behind an for cloud computing which shows that its demand is
abstraction of physical disk. There might be the possibility increasing with the passage of time. The threats from
of relative automaticity for FHE which states that on an hackers are increasing however, due to the presence of
abstraction of program FHE works as a circuit which is then existing vulnerabilities within the cloud model.
transformed.
24
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:59:57 UTC from IEEE Xplore. Restrictions apply.
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
core scientific issue [13]. In order to protect the data from application is run with huge confidentiality from the service
cloud infrastructure provider different techniques have been provider is proposed here. The manner through which the
utilized by researchers. Further, the FHE techniques are cloud-based data can be protected using trusted hardware is
applied within the cloud applications to highlight the few explored here.
difficulties. A technique through which the SAAS
25
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:59:57 UTC from IEEE Xplore. Restrictions apply.
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
26
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:59:57 UTC from IEEE Xplore. Restrictions apply.