Encryption and Security in Cloud Computing

Verified

Added on  2023/05/31

|6
|2894
|168
AI Summary
This paper analyzes the need of encryption and security in cloud computing. It identifies the challenges faced and discusses the advantages and disadvantages of using cloud computing. It also discusses the types of security and encryption methods offered with the cloud.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cloud Computing
First Author#1, Second Author*2, Third Author#3
#First-Third Department, First-Third University
Address Including Country Name
1first.author@first-third.edu
3third.author@first-third.edu
*Second Company
Address Including Country Name
2second.author@second.com

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract Cloud computing has found great importance in the
market. This is the most convenient way to share or store data.
This contains several computer systems that are connected
together to share resources. The well-known cloud software’s are
Google cloud platform, Microsoft Azure, iCloud and many more.
This is necessary to maintain a security for the stored data within
the cloud. Thus with time the need of security also increases and
this requires a huge amount of cash. This paper will identify and
analyse the need of encryption and security in the cloud
computing. Encryption helps in protecting the data from
unauthorized access and also provides highest security, as the
data can be accessed by only those members who are having the
key to decrypt thee message. There are several encryption
methods available and thus it is very necessary to understand the
perfect encryption method for the company.
Keywords- Encryption, Cloud computing, Data privacy,
Storage, Business, Cryptomator
I. INTRODUCTION
The aim of the report is to analyse the need of encryption
in providing security for the cloud computing in an
organization. The main advantage of shifting to cloud system
is that it provides easy recovery of data and backups are been
done frequently. This helps the organization to recover data
easily. Cloud computing is also known as the cloud. This
provides on demand resources and the user needs to pay for
the resources they are using. Cloud computing enables the
users with free storage and provides high elasticity. The
resources pool offered by the cloud to their customer is in a
huge amount. This ensures that a huge amount of resource is
being dynamically allocated to the customers [10]. There is no
upfront cost associated with the cloud and maintains a
transparent structure. There are different architectures
provided by the cloud and the user can choose among this
infrastructure. There are mainly three infrastructure offered by
cloud, this are as follows: IaaS ( infrastructure as a Servicee),
PaaS(Platform as a Service) and SaaS(Software as a Service).
This paper aims at discussing the advantages and
disadvantages of using cloud computing and the features
offered by this service in detailed. The paper will also discuss
about the types of security ad encryption methods offered with
the cloud.
II. IDENTIFICATION OF THE PROBLEM
The aim of the report is to identify the challenges that
are likely to cone with the use of cloud computing. There
are several challenges faced and also there are lot of
issues that arises with the security provided by the cloud.
The organization always needs to understand the need of
customer and analyse accordingly [17]. This is the
responsibility of each organization to meet the
requirement of the customer and satisfy them with their
services. The objective is to transfer and store all data
with highest security. The main problem that are faced
with the security issues are as follows:
A. Authentication
This is the responsibility of each data stored
within the organization to maintain confidentiality
and privacy. The customer’s data needs to be stored
with highest security. The user’s needs the
satisfaction that the data stored maintains the
integrity and also it is accessed by authorized person
only. This ensures that the data stored will never get
breached [13]. Moreover, it is the responsibility of
the mouser to maintain password and not to share
those credentials with other members. This will
ensure the authentication and also a necessary aspect.
B. Access control
The ability of the system to give access to only
authorized persons. This controls the number of users
and ensures that only registered person is allowed to
have the access [11].
C. Privacy
Another important factor is the privacy factor. It
is the responsibility of each site to maintain privacy
that is the data shared needs to be kept private. In
case the customer demands for deleting the
information related to the customer, it is the
responsibility of the organization to delete all records
[12].
III. LITERATURE REVIEW
A. Importance of cryptography
Cryptography is the science of providing security for
information and resources by using appropriate technologies.
Cryptography is mainly used for non-technological reasons.
This includes hiding of physical messages, or creating ciphers
so that only authorized person can have the access and can
understand the contents. This is basically the main reason for
Data Encryption [9]. The logic used in Cryptography is based
on maths and uses this logic to create algorithms for computer
systems. This is used mainly for securing the data or before
transferring the data or just before securing data storage.
Cryptography is the science of providing security for
information and resources by using appropriate technologies.
The transmission made with the Cryptography ensures that the
transferred it is done with highest security. In order to
maintain the security within the data transferred between the
computers it is necessary to encrypt the data [6].
Cryptography aim is to ensure their users that the transaction
done is secured. Key management is an important aspect in
encryption that allows you to apply common encryption
policies across all data on all managed devices. The number of
areas in which the cryptography is being used are as follows:
One way cryptographic are used for storing the
password in a way that cannot be achieved.
Cryptography allows securing delivery of
authenticating data only in one direction.
Cryptography ensures that the information is sent too
desired customer only.
Document Page
Digital signature helps in providing an effective way
to sign off an instruction within a computer.
B. Encryption
This is necessary to maintain a proper secured way of
encryption that will help in protecting the data. There are
several types of encryption available that helps in protecting
the data sets properly. This is a process of encoding a message
received by the user. In an encryption a plain text is encrypted
using encryption algorithm. After this with the help of a
cipher, cipher text is generated and that is being decoded with
the use of decryption key. With the help of Encryption it
becomes difficult for viruses, Trojans and logic bomb to get
hooked up[4]. This is the responsibility of the user to keep in
mind that in time of the encryption any coding can be placed
in the same bracket. The motive is to make the coding more
relatable and easy to interpret. This signifies that in the time of
encryption the technique used is cryptographic and every time
you compress a file or transmit it with error correction codes.
This all factors are important from the security point of view.
There are several types of encryption available, this are as
follows:
1. Symmetric and asymmetric key
cryptography
In the case of symmetric key cryptography a key is
being generated and whose copy is being kept with the
one encrypting the data and given to the user to whom
this information belongs. Thus, this ensures that only
authorized person will be able to read the message. In the
case of asymmetric key cryptography, two keys are
created one the public key and another one the private
key [7]. The public key is used to encrypt plain text
whereas the working of the private key involves
decrypting the cipher text to plain text.
2. Data encryption standard
In the year 1970, a block of cipher was created with
the purpose of encrypting and decrypting data. DES uses 56-
bit key to perform the algorithm [8]. Apart from the use and
importance of this encryption technique it is being marked as
a weak encryption method as it fails to protect the data against
brute force attacks.
3. Advanced encryption standard
This encryption method was created by two Belgian
cryptographers in the year 2002 [5]. All the drawbacks faced
with data encryption standard was being answered with this
encryption technique. The block size of AES was 128 bits and
increases with the increase in difficulty.
4. CRYPTOMATOR
Cryptomator is used to secure the cloud storage data. This
is an open source and support encryption for cloud storage
files from client side. The tool is easy to use and support
every kind of cloud storage. As these follows client side
encryption this ensures that data is encrypted and then being
synchronized with online cloud storage service.
Document Page
IV. Options out there
The cloud encryption tools helps in encrypting and
providing better security towards the information
stored in the system. The types of tools can be used
are as follows:
Boxcryptor: this is a German based encryption
software available for cloud and is famous for
fermium and user friendly interface. This tool works
by taking control over the cloud storage and reducing
security breaches. With the help of this tool the user
can use end to end encryption protocol. This is used
to encrypt the online activity taking place within the
desktop [15]. The algorithm used for this includes
combination of RSA and AES encryption.
Cryptomator: this is the best encryption tool.
Moreover, it is free and open source. User is allowed
to configure the personal desire. The main advantage
of cryptomator is that it provides transparent
encryption.in addition to this the protocol used for
encryption in cryptomator is military grade. These
ensures that the account is being protected from brute
force.
V. Encryption technique
This is necessary to understand the security provided by the
encryption methods to the cloud server. In this report I have
performed a series of tests in order to understand the
encryption method and working of the encryption method.
One of the most reliable and open source encryption
Cryptomotar is being tested [2]. Cryptomator allows easy
access and supports cloud storage. Cryptomator is used for
encryption from client side. This ensures that no data leaves
the computer without being encrypted. With the help of
cryptomator whole cloud storage of the user can be easily
encrypted. Even these allows creating multiple vault for single
cloud storage provider. This helps the user to maintain
different vaults for different purposes. Cryptomator is used to
encrypt the data stored within the cloud whereas it is not
necessary that the data needs to be stored within the cloud.
This can also use to encrypt the data stored within some
external drive [1]. The size of the vault may vary from size to
size and this will not affect the performance. The security
provided with this encryption technique is high. Cryptomator
encrypts all the data stored within file with the use of AES.
This also ensures that it provides protection from bruteforce
attacks by using the Scrypt. Scrypt is basically a password
based key derivation function and is designed so that it can
stop the attackers from entering or reading the text.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VI. Security model
This is necessary to have a better security system that
will help in providing better security. I have added two
security model that will be beneficial for cloud storage
system. There are several security threats that are
associated with cloud data services includes threats such
as network eavesdropping, side channel attacks. The
security model consist of three phase defence structure
that determines the data security within the cloud system.
The first phase works by maintaining strong
authentication system. This uses OTP as a two factor
authentication system [3]. The second phase includes a
stronger algorithm to maintain better encryption. The
third and the last phase includes recovering of data faster.
VII. RECOMMENDATION
In the report I have recommended AES and RSA for
encrypting a data. According to me, it is better to choose an
appropriate cloud architecture that will help in providing
better security towards the cloud server. In providing better
encryption method the organization can use cryptomator.
With the help of encryption one can protect the data stored
in the database. It is important to understand the need of
encryption.
REFERENCES
[1.] "What is Advanced Encryption Standard (AES)? -
Definition from WhatIs.com", SearchSecurity,
2018. [Online]. Available:
https://searchsecurity.techtarget.com/definition/Ad
vanced-Encryption-Standard. [Accessed: 20- Nov-
2018].
[2.] "What is Encryption? - Definition from
Techopedia", Techopedia.com, 2018. [Online].
Available:
https://www.techopedia.com/definition/5507/encr
yption. [Accessed: 20- Nov- 2018].
[3.] Ahmad, I., Namal, S., Ylianttila, M. and Gurtov,
A., 2015. Security in software defined networks:
A survey. IEEE Communications Surveys &
Tutorials, 17(4), pp.2317-2346.
[4.] Ali, M., Khan, S.U. and Vasilakos, A.V., 2015.
Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383.
[5.] Almorsy, M., Grundy, J. and Müller, I., 2016. An
analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
[6.] Andersson, R., 2016. Hardwiring the frontier? The
politics of security technology in Europe’s ‘fight
against illegal migration’. Security
Dialogue, 47(1), pp.22-39.
[7.] Bennett, C.H. and Brassard, G., 2014. Quantum
cryptography: Public key distribution and coin
tossing. Theor. Comput. Sci., 560(P1), pp.7-11.
[8.] Bose, J.S.C. and Gopinath, G., 2015. An ETC
System Using Advanced Encryption Standard and
Arithmetic Coding. Middle-East Journal of
Scientific Research, 23(5), pp.932-935.
[9.] Cao, Y. and Bai, J., 2015, October. A passive
attack against an asymmetric key Exchange
Document Page
Protocol. In Computer Science and Mechanical
Automation (CSMA), 2015 International
Conference on (pp. 45-48). IEEE.
[10.] cyberduck.io (2018). Cryptomator. [online]
Cyberduck.io. Available at:
https://cyberduck.io/cryptomator/ [Accessed 20
Nov. 2018].
[11.] Hong, J.B. and Kim, D.S., 2016. Assessing
the effectiveness of moving target defenses using
security models. IEEE Transactions on
Dependable and Secure Computing, (1), pp.1-1.
[12.] Horalek, J. and Sobeslav, V., 2018, August.
Analysis of the Use of System Resources for
Cloud Data Security. In International Conference
on Mobile Web and Intelligent Information
Systems (pp. 101-111). Springer, Cham.
[13.] Klimoski, R., 2016. Critical success factors
for cybersecurity leaders: Not just technical
competence. People and Strategy, 39(1), p.14.
[14.] Lindell, Y. and Katz, J., 2014. Introduction
to modern cryptography. Chapman and Hall/CRC.
[15.] Mainanwal, V., Gupta, M. and Upadhayay,
S.K., 2015, March. A survey on wireless body
area network: Security technology and its design
methodology issue. In Innovations in information,
embedded and communication systems (ICIIECS),
2015 international conference on (pp. 1-5). IEEE.
[16.] Sen, J., 2015. Security and privacy issues in
cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 1585-
1630). IGI Global.
[17.] Van Tilborg, H.C. and Jajodia, S. eds.,
2014. Encyclopedia of cryptography and security.
Springer Science & Business Media.
[18.] Mukhopadhyay, D., 2017. Cryptography:
Advanced Encryption Standard
(AES). Encyclopedia of Computer Science and
Technology, p.279.
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]