Open Access. © 2020 R. Jain and A. Nayyar, published by De Gruyter. This work is licensed under the Creative Commons Attribution 4.0 License Open Comput. Sci. 2020; 10:431ś443 Research Article Rachna Jain and Anand Nayyar* A novel homomorphic RASD framework for secured data access and storage in cloud computing https://doi.org/10.1515/comp-2020-0206 Received Sep 24, 2019; accepted Jan 29, 2020 Abstract: In the distributed computing worldview, the client and association’s information is put away remotely on the cloud server. Clients and associations can get to applications, administrations, and foundation on-request from a cloud server through the internet, withstanding the various advantages, numerous difculties, and issues that endure verifying cloud information access and ca- pacity. These difculties have featured additional security and protection issues as cloud specialist co-ops are ex- clusively in charge of the capacity and handling of the association’s information out of its physical limits. Hence, a robust security plan is required in order to ensure the association’s touchy information emerges to keep the in- formation shielded and distant from programmers. Over the globe, specialists have proposed fuctuated security structures having an alternate arrangement of security standards with changing computational expense. Down to earth usage of these structures with low calculation cost remains an extreme test to tackle, as security standards have not been characterized. Methodology ś To verify the cloud and deal with all se- curity standards, we propose a REGISTRATION AUTHEN- TICATION STORAGE DATA ACCESS (RASD) structure for giving security to authoritative information put away on cloud catalogs utilizing a novel security plot, for example, H E E T P S . A RASD system involves a stage by stage process- Enlistment of clients, Authentication of the client secret key, and Capacity of information just as information ac- cess on cloud registry. When the system is connected to cloud servers, all the delicate information put away on the cloud will end up being accessible just to verifed clients. The essential favourable position of the proposed RASD structure is its simple usage, high security, and overall less computational expense. Moreover, we propose a homomorphic-private-practical *Corresponding Author: Anand Nayyar: Duy Tan University, Da Nang, Vietnam; Email: anandnayyar@duytan.edu.vn Rachna Jain: Bharati Vidyapeeth’s College of Engineering, Delhi, India; Email: rachna.jain@bharatividyapeeth.edu uniformity testing-based plan structured under a schematic calculation C he A et D Ps . This calculation ex- ecutes homomorphic encryption with subtractive fair- ness testing, notwithstanding low computational intri- cacy. To test the security ability, we tried the proposed RASD system with other existing conventions like Privacy- protecting examining convention, group reviewing con- vention, verifed system coding convention, and encoded information preparing with homomorphic re-encryption convention. Findings ś Experimentation-based outcomes demonstrated that the RASD structure not only gives a high-security layer for delicate information but also en- ables a decrease in computational expense and performs better when compared with existing conventions for dis- tributed computing. Keywords: Cloud, Privacy Sustainability, Homomorphic Encryption, Key generation, Secured data access 1 Introduction These days, cloud computing has turned out to be critical on account of its novel style of processing in the rapidly evolving innovation. The client can accumulate enormous information measures in the stage given by the cloud spe- cialist co-ops and access it when required. Thus, the in- novation of distributed computing has developed as an- other method for facilitating and conveying administra- tions to the client over the Internet. Notwithstanding that, distributed computing is very appealing to proprietors of independent ventures as it kills the need to empty tremen- dous assets into the physical capacity for their informa- tion. Also, it enables the enterprises to initiate even from a smaller scale [1, 2]. Moreover, this strategy builds the number of assets based on mounting administration requests. The National Institute for Standards and Technology (NIST) [3] is one of those associations that characterize cloud computing in their own specifc manner as łA model for empowering ad- vantageous, on-request organized access to a mutual pool of confgurable registering assets (e.g., systems, servers,