Loading

Data Confidentiality in Cloud using Multi-party Computation
A.Vijaya Kumar1, P. Ramya2, R. Poojitha3, M. Lahari4

1Mr. A. Vijaya kumar, Associate Professor, CSE Department, KL University, Guntur, Andhra Pradesh, India.
2P. Ramya, Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India.
3R.Poojitha, Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India.
4M.Lahari, Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India.
Manuscript received on December 16, 2019. | Revised Manuscript received on December 25, 2019. | Manuscript published on January 10, 2020. | PP: 58-62 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8015019320/2020©BEIESP | DOI: 10.35940/ijitee.C8015.019320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A new era has approached where we are storing our information in cloud and performing several computations on powerful servers remotely. In cloud, data is not completely secured and sometimes under the control of untrusted Third parties. Some secured protocols are being implemented. The secure multi-party computation protocol, which is existing, demands the inputs to be encrypted using a public key. So, these reasons limit this Secure Multi-party computation to be employed. In the current paper, we put forward a protocol named homomorphic encryption where the input function is being encrypted by different key. This paper also uses Multi-party computation which is one of the most secured technique in cryptography. 
Keywords: Cloud Computing, Confidentiality, Multi-party Computation, Homomorphic Encryption.
Scope of the Article: Cloud Computing