logo

Cloud Cryptography for Privacy

   

Added on  2022-12-05

14 Pages3660 Words239 Views
Running head: CLOUD CRYPTOGRAPHY FOR PRIVACY
CLOUD CRYPTOGRAPHY FOR PRIVACY
Name of the Student
Name of the University
Author Note:

CLOUD CRYPTOGRAPHY FOR PRIVACY1
Abstract
Data Storage can be considered to be as one of the major usages of cloud computing. Cloud aims to
provide a huge amount of capacity for data storage for all the cloud users. It can be considered to be a
flexible and reliable method to a user for storing data and retrieving it at any time and location. With
every passing year, it is found to be as one of the growing technology. Most of the enterprises have
started using cloud storage as a result of various benefits. Cloud aims to gain a huge amount of popularity
as a result of usability and interaction. The major issue is with data security, data privacy and other kinds
of protection problems.

CLOUD CRYPTOGRAPHY FOR PRIVACY2
Table of Contents
Introduction....................................................................................................................................3
Main Body......................................................................................................................................3
Findings..........................................................................................................................................7
Conclusion......................................................................................................................................9
References....................................................................................................................................10

CLOUD CRYPTOGRAPHY FOR PRIVACY3
Introduction
The biggest method of securing data transmission mainly relies on the overall security of cloud
storage. Cloud aims to provide a huge amount of capacity which is required for storing data of different
cloud users. It is much more flexible and reliable method for storing and retrieving data at any place and
time (Choo, Domingo-Ferrer & Zhang, 2016). It is found to be a growing technology which is being used
by many enterprises that makes use of cloud storage. As cloud aims to gain popularity as a result of
usability and attraction. The major issues lie in the overall data security, privacy and data protection
issues. Both security and data privacy in the cloud aims to have a major setback in the domain of cloud
computing. In the domain of cloud computing, both security and privacy aim to play like a key issue.
Cloud computing is found to be next-generation architecture of IT enterprise architecture (Al Hamid et
al., 2017). This can be defined as one the best method for big data processing and analytics that allow the
user to store and analyze data by making use of shared computing resources.
In this report, an overview has been provided with respect to different cryptographic techniques.
It is mainly related to address different threats and security goals for analyzing the security of cloud
computing. Private semi-trusted cloud will allow different researchers to properly design cloud by making
use of cryptographic techniques. It is mainly needed for protecting the semi-trusted ones.
Main Body
Cloud computing mainly focus on service side where data security and trust is not taken to be
sufficient one. There are many techniques on the concept of cloud computing which has been analyzed
with respect to both academics and industries (Hong et al., 2016). Protection of data security and privacy
is becoming an important aspect for the development of cloud computing in various domain like
government, industries and business. There is a list of security risk for any sensitive data which is there in
cloud computing (Esposito et al., 2018). There is a need for entrusting the data protection for some of the
third party cloud provider which directs the protection provided by cryptography in the cloud. When a

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Security and Privacy
|7
|1639
|217

(PDF) Cloud Computing Assignment
|3
|2868
|157

Framework Modeling for User Privacy in Cloud Computing
|8
|5479
|500

Encryption and Security in Cloud Computing
|6
|2894
|168

Cryptography and Network Security Applications
|8
|1917
|96

Review of Authentication techniques for enhancing the security of wearable devices using cryptography
|2
|494
|458