Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2017, Cybernetics Approaches in Intelligent Systems
…
10 pages
1 file
The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud and it is highly crucial to protect the sensitive data and systems in the cloud setting in order to ensure the privacy of its users. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.
International Journal for Research in Applied Science and Engineering Technology, 2017
Cloud Computing is a fast-growing area and its security issues block the prevalence widely. The organizations are lethargic in accepting it due to these issues and challenges associated with it. Security is the most important concern in cloud computing including the data protection, network security, virtualization security, application integrity, and identity management. Data protection is one of the most important among these issues. The major reason is, organizations will transfer their data to remote machines if and only if the cloud service providers provide guaranteed data protection. Even though many techniques are proposed/recommended for security in cloud computing, however, there are still a lot of challenges in this area. One of the most popular techniques is Cryptography, which can be used in addressing the security issues. The various techniques/algorithms in it playing a vital role in addressing the security issues. This paper enlightens the role of Cryptography, and its various techniques that are helpful in addressing the cloud security issues, in which our research would be focusing.
2013
In this paper we are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption techniques along with RSA. Cloud computing provides the customer with the requested services. It refers to applications and services that run on distributed network using virtualized resources and accessed by common IP and network standard. While providing data services it is becoming important to provide security for data. In cloud computing keeping data secure is an important issue to be focused. Even though AES was designed for military purposes, now a days it is been commercially adopted worldwide as it can encrypt most confidential document, as well as it can work in most restricted areas, and offers good defense against various attack techniques, and security level to protect data for next 2-3 decades.
2013
Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users' data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the "keys generation and management" mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that impl...
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Cloud computing is the delivery of computing services over the web instead of keeping files on a proprietary disk drive or local memory device. Computing services can include servers, storage, databases, networking, software. The main reason and great advantage for using the cloud are that the user can store and access the stored data in the cloud from anywhere anytime and getting all its services for a low cost. Despite, Security has always been a big concern with cloud computing because the information stored in the cloud is not directly maintained by the customer. When the user uploaded or stored data during a cloud computing service, the info owners are unlikely to understand the path via which their data is being transmitted. The user is unknown to the fact whether the information is being collected, analyzed, and accessed by a third party or not. To overcome the security issues various cryptography algorithm is proposed. This paper focused on the basics of cloud computing and ...
Handbook of Research on Threat Detection and Countermeasures in Network Security, 2015
Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.
Matrix Science Mathematic
Cloud computing is a platform for dynamically enhancing capabilities and increasing potentialities without requiring the addition of new hardware, employees, or software. Additionally, cloud computing began as a business notion and later became a successful IT innovation. Concerns have been expressed about the security of the cloud environment, though, considering that the cloud contains a lot of information about people and businesses. Although cloud computing has received a lot of attention, clients are still hesitant to move their businesses there. However, the only significant issue preventing greater adoption of cloud computing is a lack of protection. Additionally, the market is wary about cloud computing due to the intricacy with which it controls data protection and confidentiality. When used in a cloud context, the cloud model architecture jeopardises the security of current technology. Therefore, cloud service customers should be aware of the risks associated with uploadin...
Information Management And Computer Science
The delivery of computing services over the internet, as opposed to storing data on a local memory device or a proprietary disc drive, is known as cloud computing. Servers, storage, databases, networking, and software are some examples of computing services. The primary justification and major benefit of using the cloud are the user’s ability to store data there and access it from any location at any time, as well as the low cost of all its services. Despite this, because the data stored in the cloud is not directly maintained by the customer, security has always been a major concern with cloud computing. The data owners are unlikely to be aware of the route their data is taking when they upload or store data using a cloud computing service. The user is unaware of whether or not a third party is gathering, processing, and accessing their information. Numerous cryptography algorithms have been proposed to address security concerns. This paper discussed different cryptography algorith...
TJPRC, 2014
Cloud Computing is an emerging technology widely used in the IT sector due its wide range of characteristics. These characteristics serve a medium for the intruders to attack the cloud and its users. The security of cloud can be compromised by employing different strategies and techniques. Many systems and techniques have been proposed for solving the security issues and implementing a high level of security on both the sides. Encryption is one of the best method suggested for making the cloud more secure and increasing its areas of application. This paper contains an overall study and comparison of various cryptographic algorithms implemented for cloud security. We also study some hybrid systems designed using combination of various crypto terminologies for enhancing data security in cloud. The hybrid systems implement multiple cryptographic algorithms like RSA and Digital signature, Diffie Hellman and AES in combination with Digital signature. Some of the comparison parameters included are technique proposed, type of algorithm, algorithm, scalability.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Cloud computing is the provision of computing and storage capacity to users as a service. Cloud storage is a type of networked online storage where data is stored in virtualized storage pools as a subservice of infrastructure as a service (IaaS) in cloud computing. Cloud computing plays a significant role in the efficient use of resources and in the utilization of service. Regardless of the cloud category (e.g. private, public, hybrid or inter-cloud), all service providers rely on domain server data. As a rapid development and deployment of cloud computing and cloud storage, users are increasingly concerned about security and privacy issues involved in these techniques. This paper provides a summary of basic security problems that consist of conventional security issues. It also addresses the additional challenges resulting from the cloud computing paradigm being used by cloud system providers and consumers. In addition, solutions suggested by some researchers are presented with a focus on cryptographic techniques which support secure storage of the cloud.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Science and Research Archive, 2024
International Journal For Multidisciplinary Research
International Journal of Computer Applications, 2021
Journal of emerging technologies and innovative research, 2019
International Journal of Recent Technology and Engineering, 2019
International Journal of Computer Sciences and Engineering, 2018
Indo-Iranian Journal of Scientific Research (IIJSR), 2019
Journal of Ambient Intelligence and Humanized Computing, 2016
International Journal of Electrical and Computer Engineering (IJECE), 2023
International Journal of Engineering Sciences & Research Technology, 2014