logo

Disadvantages of Cloud Services and Outsourcing Sensitive Data

A secure multi-keyword ranked search scheme over encrypted cloud data is proposed, which supports dynamic update operations and ensures privacy requirements.

2 Pages636 Words80 Views
   

Added on  2023-03-23

About This Document

This assignment discusses the disadvantages of cloud services and outsourcing sensitive data, focusing on privacy issues and the need for encryption. It explores research questions related to the use of cloud platforms, the sufficiency of encryption for data security, and the use of encryption techniques in organizations. The assignment also outlines the research methodology, including primary and secondary research strategies, and the data gathering and analysis techniques to be used.

Disadvantages of Cloud Services and Outsourcing Sensitive Data

A secure multi-keyword ranked search scheme over encrypted cloud data is proposed, which supports dynamic update operations and ensures privacy requirements.

   Added on 2023-03-23

ShareRelated Documents
Besides providing various advantages, cloud services also provides disadvantages, similarly
outsourcing sensitive data like, personal health records, mails, government documents, company
finance data to various remote servers can result in privacy issues. The providers of cloud services
might access the data that has been provided to them in order to provide more security to their
data. This could be done without authorization from the owner of the data. This data could be
protected is by encrypting them before they are outsourced. This would cost in the terms of usability
of data.
Researchers had designed various general-purpose solutions along with completely encryption that
is homomorphic. The methods have not been practical because of their increased computational
overhead for user as well as cloud server. On contrary to this, practical as well as solutions that are
for special purpose like searchable encryption (SE) schemes had made various investments in the
aspects of the efficiency, security as well as the functionality. Searchable encryption schemes allow
clients in storing data that is encrypted in cloud and hence execute the search on the basis of
keyword on the domain of cipher text
The research questions that has been presented include
How cloud platform can be used by organizations?
Is encryption enough for securing data?
How can organizations use encryption techniques for securing confidential data?
Searchable encryption schemes usually allows the client for storing encrypted data in the platform of
cloud and hence execute the keyword search over the domain of cipher text. Because of various
primitives of cryptography, schemes of searchable encryption could be implemented using public
key based cryptography along with cryptography that is based on symmetric key. Designing of a
searchable encryption scheme could be done that would support the precise search that is ranked
multi- keyword as well as flexible dynamic operation on the collection of document.
1) Design a particular scheme for searchable encryption which supports both the precise as well as
multi-keyword ranked search as well as flexible dynamic operation on the factor of document
collection.
2) Give a detailed knowledge regarding the encryption techniques used for securing data.
Provide detailed knowledge on how data can be secured in an organization.
Our contribution in this particular assignment is to carry out research and record the results
obtained from it. Various research methods had been reviewed and the most reliable ones have
been selected. The qualitative as well as quantitative research methodology has been reviewed and
the one that has chances to produce more results has been selected.
The research strategy that would be used for the purpose of carrying out this research includes
primary as well as secondary research strategy. Primary research would help in carrying out a real
Disadvantages of Cloud Services and Outsourcing Sensitive Data_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Research on Cloud Computing and Data Encryption
|13
|653
|95

SECURE SEARCHABLE ENCRYPTION SECURE SEARCHABLE ENCRYPTION Name
|5
|1158
|61

Cryptographic Techniques
|6
|2878
|62

CRYPTOGRAPHIC TECHNIQUES.
|3
|398
|59

Research Proposal
|6
|1282
|232

Enabling Fine-Grained Access Control Over Encrypted Data
|3
|824
|16