logo

Secure User Data in Cloud Computing Using Encryption Algorithms

The assignment requires students to read and review a peer-reviewed article from a scholarly journal in the field of Advance Networking and Communication Systems.

6 Pages1418 Words140 Views
   

Added on  2022-11-28

About This Document

This article discusses the security challenges in cloud computing and proposes encryption algorithms to ensure the reliability of cloud data. It explores the advantages of cloud computing and the associated security concerns. Various encryption algorithms are also presented for securing cloud data.

Secure User Data in Cloud Computing Using Encryption Algorithms

The assignment requires students to read and review a peer-reviewed article from a scholarly journal in the field of Advance Networking and Communication Systems.

   Added on 2022-11-28

ShareRelated Documents
name of student
name of college
authors note
CLOUD COMPUTING
1
Secure User Data in Cloud Computing Using Encryption Algorithms_1
CLOUD COMPUTING
Analysis
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud
computing using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
In the current paper the authors focuses on providing information regarding security challenges
in cloud computing and helps in the identification of mechanism, challenges which are
experienced by cloud service providers within engineering in cloud and also proposes different
encryption algorithm so as to insure reliability of cloud data. The cloud computing is generally a
form of outsourcing of software, data repository and processing where users ingress applications
and information through logging into any machine which is connected with internet. Data and
applications are provided by third parties and inhabit universal arrangement for protected data
which promotes sharing and cooperation irrespective of location of user or machine utilised.
The authors define cloud computing as the capability to ingress large number of computing that
data are possessed and governed by a third party through the Internet. The authors believe that
cloud computing comprises of hardware, networks, storage, services and interfaces which
provide the platform for users to gain access to the o demand infrastructures, application,
services and computer power irrespective of their locations. The authors also help in highlighting
that computing in cloud generally comprise of the distribution, storage, and handling of data on
the third party’ arrangement, which is not declared in the administration process of customers.
The authors in the article also present that the concept of computing through the cloud is closely
related to service oriented architecture such as Information as a Service (IaaS), Platform as a
Service (PaaS), and Software as a Service (SaaS).1
The authors highlight fact that cloud computing have multiple advantages over traditional
computing which includes greater agility, lower cost of entry, independency among devices,
independency of location and scalability.2
1Nouf S. Aldahwan and Mohamed S. Saleh
2Thomas Chen, Chuang Ta-Tao, and.Kazuo Nakatani
2
Secure User Data in Cloud Computing Using Encryption Algorithms_2
CLOUD COMPUTING
The first security issue which is associated with cloud computing is that it leads to loss of
physical security as a result of sharing of computing resources with other companies and there is
lack of idea and control regarding where resources run. The solution identified to solve the issues
is ensuring secure Data Transfer.3
The second security issue which is associated with computing in the cloud states that the concept
of ensuring data integration which includes transfer, storage, and retrieval relates to changes
which is associated in answer to transactions that are authorized as a mutual standard for
ensuring uprightness of data does not currently exists in cloud computing. The solution identified
to solve the issue is ensuring Software Interfaces which are secure.
The third security issue which is associated with computing is that the customers have the ability
to sue cloud service providers on grounds of violation of privacy rights, which may cause
damage of reputation of providers of cloud services. Concerns regarding cloud computing arises
when the customers do not have idea regarding the rational of requesting for their personal
information and query regarding how their information will be transferred to other parties. The
solution identified to solve the issue is ensuring separation of data.4
The fourth security issue which is associated with cloud computing is confusion regarding who
will control the encryption or decryption key but in all logical sense is should be the customers.
The solution identified to solve the issue is securing Stored Data.
The fifth security issue which is associated with cloud computing is that data logs must be
offered to the regulators and managers of security in cases of Payment Card Industry Data
Security Standard (PCI DSS). The solution which is identified to solve the issue is ensuring user
access control.5
The authors propose various security algorithms for ensuring cloud data security. The first and
foremost public key algorithm which is proposed by the author is RSA, named after its inventors
Rivest, Shamir, and Adleman (RSA) which is mainly an encryption /decryption algorithm which
is unsymmetrical in nature, as in RSA, distribution of public key is done to all users via which a
3DarkoEtinger and Marijan Cingula
4IonelaBaltatescu, PhD.
5Manpreetkaur and Hardeep Singh.
3
Secure User Data in Cloud Computing Using Encryption Algorithms_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud computing management information system
|5
|1244
|186

Cloud Services for DAS: Security and Privacy Implications
|25
|2057
|203

Securing User Data In Computing Of Cloud Using Encryption Algorithm
|13
|780
|167

User Data Securing In Cloud Computing Using Encryption Algorithm.
|10
|338
|74

(PDF) Cloud Computing Assignment
|3
|2868
|157

Encryption and Security in Cloud Computing
|6
|2894
|168