Securing User Data In Computing of Cloud Utilising The Algorithm of Encryption
Verified
Added on 2023/01/11
|8
|2054
|51
AI Summary
This study discusses the security issues, mechanisms, and challenges offered by cloud computing, and presents a study on different security algorithms. It focuses on securing user data in cloud computing using encryption algorithms such as RSA, AES, DES, and Blowfish.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD COMPUTING CLOUD COMPUTING Name of the Student Name of the Organization Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CLOUD COMPUTING Securing User Data In Computing of Cloud Utilising The Algorithm of Encryption Introduction Cloud computing is mostly known to be totally transforming the information technology or IT. As it has been observed that a huge number of information and a number of processes are being to have been migrating to the cloud, it is not just transforming wherever computing is seen to be done, it is also about how actually it is done. As it is known that there is a great increment in both the academic worlds and also the corporate one which are actually investing a huge amount of money for this particular specialised as well as advanced technology, it is hugely altering the working environment for almost all the professionals of information technology in a drastic manner. Cloud computing is providing with significant solutions to a large number of problems which are related to computing which is very much conventional including proper handling of several peak loads, software’s update installation and using several excessive computing cycles. However, this specific technology has also been seen to have created a huge number of totally new challenges data security, trans-code data storage and also the proper ownership of data. In this particular study, there is a proper discussion especially made about all kinds of different issues related to the security, several mechanisms and a huge number of challenges offered by cloud which are actually linked or rather related to the cloud computing which is often faced by a rathe provider of service mainly during the cloud computing. This particular study has even presented a specific study mainly a metamorphic one about different kinds of security algorithms.
2CLOUD COMPUTING Security Issues Security is considered as one of the main aspects which are highly critical as per computing of everyday is thought of, and it is not different from the cloud computing due to the importance of data storage as well as sensitivity upon the cloud. The particular infrastructure of the computing of cloud usually utilises a huge number of services as well as technologies which are fully new and almost all of them are not totally evaluated as per security is taken into account. Cloud computing has a large number of concerns and issues as well like the data security, rules, trust and some kinds of performance issues. One issue can be related to the computing of cloud which is that there may be chances that management of data may not be fully trustworthy. A large number of risks from the insiders which are highly malicious into the cloud and the failure of cloud service have received a strong attention by different enterprises. There are some serious concerns which are related to the security of the cloud computing. The first one is that with the help of cloud, there is a lack of physical security which has been noticed because of the sharing of resources with different enterprises. There is no proper knowledge regarding where to actually run all of the resources. The second security concern is that there is no presence of a standard mainly a common one for ensuring proper data integrity. Ensuring integrity of data actually means that it changes only with the response to several authorised transactions. The third security concern is that there is always a huge chance of massive damage to the reputation of all cloud service providers if there are any kinds of privacy which are totally violated. A number of concerns are seen to be arising whenever there is no appropriate clearance to all individuals about a particular reason which says why all of their personal information are requested or rather passed upon different other parties. The fourth concern related to security arises a number of questions regarding who is actually controlling all the keys of either
3CLOUD COMPUTING decryption or encryption. There is even some other concern relate to security which is specially defined in the PCI DSS logs of data are to be provided to all of the security managers and also to all the regulators. Proposed Work Planning There has been a proposed plan of work which involves a huge number of algorithms of security for the elimination of different concerns related to the data loss and also privacy during the particular access of the web application upon the cloud. A large number of algorithms are used like RSA, Blowfish and DES within this particular study. Even a comparative study has been properly depicted for ensuring security of data upon the cloud. All these algorithms are actually all the main algorithms which are particularly symmetric within which a specific key is used for both the encryption and decryption of several messages. RSA Algorithm The algorithm of RSA is mainly utilised for making sure about the security of data in the cloud computing. In this specific algorithm, data is encrypted for offering security. The main purpose of providing security to the data is that all the users who are specially authorised are finally able to access it. After encryption has been done, data is seen to be stored into the cloud so that whenever it will be required then a request will be placed to the cloud provider. After that the cloud provider will authenticate the user and then data will be delivered the particular user. RSA is mainly a block Cipher in which every message is to be mapped clearly to a specific integer. Within the environment of the cloud which is proposed, the key which is public is known to all but the key which is private is known by only a particular user who is owning data. Hence, encryption is mainly done by the provider of service of the cloud and the decryption is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CLOUD COMPUTING done by the cloud user. As soon as the data will be encrypted with the particular key which made public, it is decrypted with the help of the corresponding private key. AES Algorithm AES algorithm is also called Rijindael and it is mainly used for the purpose of the security of information. It is actually a block cipher which is particularly symmetric which has been analysed and widely used in the current days. At first, the user is seen to be taking decision for utilising all the cloud services and will also be migrating data upon the cloud. After that the user will submit all the service needs with the provider of service of cloud and will be finally opting for the services which will be appropriately suited which will be mainly offered by the provider. Once encryption has been done, data will be then finally uploaded in the cloud. Any type of request for data reading will occur after decryption has occurred on particularly the user end and then a plain text will be read by the user. AES has replaced the DES as a particular standard which is greatly approved for a wide range of applications. DES Algorithm DES is also a block cipher as well which mainly capable of encrypting data in a number of blocks having size of about 64bits each. This type of plain text will be mainly going as input to the DES and this will be producing a cipher text of about 64bits. A common algorithm as well as key will be used for encryption and decryption with a very little difference in between them. Hence, it can be said that DES is mainly a symmetric key algorithm. Blowfish Algorithm Blowfish algorithm is mainly an algorithm of symmetric key which is a cryptographic one. It is capable of encrypting blocks of about 64bit having a key length which is highly
5CLOUD COMPUTING variable of about 128-448 bits. The rate of encryption of the algorithm of Blowfish upon the 32bit microprocessor is quite faster and it is about 26 cycles of the clock per byte. It can be able to execute within about less than 5kb of memory. It utilises only those operations which are totally primitive like the addition or the XOR one and this has made both the implementation and also the design very much simple. Blowfish algorithm has the lowest need for the memory. The DES algorithm consumes the lowest encryption time and on the other hand the RSA algorithm mainly consumes the longest memory size and also encryption time. Conclusion It can be concluded that in the recent era, a huge cloud demand has been noticed to be increasing and therefore security of both user and the cloud has been considered to be top topic which is to be concerned. Hence, all of these algorithms which are seen to have been proposed are really very much helpful for all the needs of the recent times. In the nearer future, there will be a huge number of comparisons with a variety of approaches and also results for clearly showing the great effectiveness of the structure or the framework which is has been proposed can be offered with a great ease.
6CLOUD COMPUTING Bibliography [1] H.T. Dinh, C. Lee, D. Niyato and P. Wang. A survey of mobile cloud computing: architecture,applications,andapproaches.Wirelesscommunicationsandmobile computing,13(18), pp.1587-1611, 2013. [2] R. Arora, A. Parashar and C.C.I Transforming. Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), pp.1922-1926, 2013. [3] N. Fernando, S.W Loke and W. Rahayu. Mobile cloud computing: A survey.Future generation computer systems,29(1), pp.84-106, 2013. [4] J.W. Rittinghouse and J.F. Ransome.Cloud computing: implementation, management, and security. CRC press, 2016. [5] Fernando, N., Loke, S.W. and Rahayu, W., 2013. Mobile cloud computing: A survey.Future generation computer systems,29(1), pp.84-106. [6] Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing usingencryptionalgorithms.Internationaljournalofengineeringresearchand applications,3(4), pp.1922-1926. [7] M. Whaiduzzaman, M. Sookhak, A. Gani, A. and R. Buyya. A survey on vehicular cloud computing.Journal of Network and Computer applications,40, pp.325-344, 2014. [8] S. Carlin and K. Curran. Cloud computing security. InPervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments(pp. 12-17). IGI Global, 2013. [9] A. Botta, W. De Donato, V. Persico and A. Pescapé. Integration of cloud computing and internet of things: a survey.Future generation computer systems,56, pp.684-700, 2016. [10] K. Hashizume, D.G. Rosado, E. Fernández-Medina and E.B. Fernandez. An analysis of security issues for cloud computing.Journal of internet services and applications,4(1), p.5, 2013.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CLOUD COMPUTING [11] Z. Xiao, W. Song and Q. Chen. Dynamic resource allocation using virtual machines for cloud computing environment.IEEE transactions on parallel and distributed systems,24(6), pp.1107-1117, 2013. [12] Z. Xiao and Y. Xiao. Security and privacy in cloud computing.IEEE communications surveys & tutorials,15(2), pp.843-859, 2013.