This paper analyzes the need of encryption and security in cloud computing. It identifies the challenges faced and discusses the advantages and disadvantages of using cloud computing. It also discusses the types of security and encryption methods offered with the cloud.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Cloud Computing First Author#1, Second Author*2, Third Author#3 #First-Third Department, First-Third University Address Including Country Name 1first.author@first-third.edu 3third.author@first-third.edu *Second Company Address Including Country Name 2second.author@second.com
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract—Cloud computing has found great importance in the market. This is the most convenient way to share or store data. Thiscontainsseveralcomputersystemsthatareconnected together to share resources. The well-known cloud software’s are Google cloud platform, Microsoft Azure, iCloud and many more. This is necessary to maintain a security for the stored data within the cloud. Thus with time the need of security also increases and this requires a huge amount of cash. This paper will identify and analysetheneedofencryptionandsecurityinthecloud computing.Encryptionhelpsinprotectingthedatafrom unauthorized access and also provides highest security, as the data can be accessed by only those members who are having the keytodecrypttheemessage.Thereareseveralencryption methods available and thus it is very necessary to understand the perfect encryption method for the company. Keywords- Encryption, Cloud computing, Data privacy, Storage, Business, Cryptomator I.INTRODUCTION The aim of the report is to analyse the need of encryption inprovidingsecurityforthecloudcomputinginan organization. The main advantage of shifting to cloud system is that it provides easy recovery of data and backups are been done frequently. This helps the organization to recover data easily. Cloud computing is also known as the cloud. This provides on demand resources and the user needs to pay for the resources they are using. Cloud computing enables the users with freestorage and provides high elasticity. The resources pool offered by the cloud to their customer is in a huge amount. This ensures that a huge amount of resource is being dynamically allocated to the customers [10]. There is no upfrontcostassociatedwiththecloudandmaintainsa transparentstructure.Therearedifferentarchitectures provided by the cloud and the user can choose among this infrastructure. There are mainly three infrastructure offered by cloud, this are as follows: IaaS ( infrastructure as a Servicee), PaaS(Platform as a Service) and SaaS(Software as a Service). Thispaperaimsatdiscussingtheadvantagesand disadvantagesof using cloud computing and the features offered by this service in detailed. The paper will also discuss about the types of security ad encryption methods offered with the cloud. II.IDENTIFICATION OF THE PROBLEM The aim of the report is to identify the challenges that are likely to cone with the use of cloud computing. There are several challenges faced and also there are lot of issues that arises with the security provided by the cloud. The organization always needs to understand the need of customerandanalyseaccordingly[17].Thisisthe responsibilityofeachorganizationtomeetthe requirement of the customer and satisfy them with their services. The objective is to transfer and store all data with highest security. The main problem that are faced with the security issues are as follows: A.Authentication This is the responsibility of each data stored within the organization to maintain confidentiality and privacy. The customer’s data needs to be stored withhighestsecurity.Theuser’sneedsthe satisfactionthatthedatastoredmaintainsthe integrity and also it is accessed by authorized person only. This ensures that the data stored will never get breached [13]. Moreover, it is the responsibility of the mouser to maintain password and not to share thosecredentialswithothermembers.Thiswill ensure the authentication and also a necessary aspect. B.Access control The ability of the system to give access to only authorized persons. This controls the number of users and ensures that only registered person is allowed to have the access [11]. C.Privacy Another important factor is the privacy factor. It is the responsibility of each site to maintain privacy that is the data shared needs to be kept private. In casethecustomerdemandsfordeletingthe informationrelatedtothecustomer,itisthe responsibility of the organization to delete all records [12]. III.LITERATURE REVIEW A. Importance of cryptography Cryptography is the science of providing security for information and resources by using appropriate technologies. Cryptography is mainly used for non-technological reasons. This includes hiding of physical messages, or creating ciphers so that only authorized person can have the access and can understand the contents. This is basically the main reason for Data Encryption [9]. The logic used in Cryptography is based on maths and uses this logic to create algorithms for computer systems. This is used mainly for securing the data or before transferring the data or just before securing data storage. Cryptographyisthescienceofprovidingsecurityfor information and resources by using appropriate technologies. The transmission made with the Cryptography ensures that the transferreditisdonewithhighestsecurity.Inorderto maintain the security within the data transferred between the computersitisnecessarytoencryptthedata[6]. Cryptography aim is to ensure their users that the transaction done is secured. Key management is an important aspect in encryptionthatallowsyoutoapplycommonencryption policies across all data on all managed devices. The number of areas in which the cryptography is being used are as follows: •Onewaycryptographicareusedforstoringthe password in a way that cannot be achieved. •Cryptographyallowssecuringdeliveryof authenticating data only in one direction. •Cryptography ensures that the information is sent too desired customer only.
•Digital signature helps in providing an effective way to sign off an instruction within a computer. B. Encryption Thisisnecessarytomaintainapropersecuredwayof encryption that will help in protecting the data. There are several types of encryption available that helps in protecting the data sets properly. This is a process of encoding a message received by the user. In an encryption a plain text is encrypted using encryption algorithm. After this with the help of a cipher, cipher text is generated and that is being decoded with the use of decryption key. With the help of Encryption it becomes difficult for viruses, Trojans and logic bomb to get hooked up[4].This is the responsibility of the user to keep in mind that in time of the encryption any coding can be placed in the same bracket. The motive is to make the coding more relatable and easy to interpret. This signifies that in the time of encryption the technique used is cryptographic and every time you compress a file or transmit it with error correction codes. This all factors are important from the security point of view. There are several types of encryption available, this are as follows: 1.Symmetricandasymmetrickey cryptography In the case of symmetric key cryptography a key is being generated and whose copy is being kept with the one encrypting the data and given to the user to whom this information belongs. Thus, this ensures that only authorized person will be able to read the message. In the caseofasymmetrickeycryptography,twokeysare created one the public key and another one the private key [7]. The public key is used to encrypt plain text whereastheworkingoftheprivatekeyinvolves decrypting the cipher text to plain text. 2.Data encryption standard In the year 1970, a block of cipher was created with the purpose of encrypting and decrypting data. DES uses 56- bit key to perform the algorithm [8]. Apart from the use and importance of this encryption technique it is being marked as a weak encryption method as it fails to protect the data against brute force attacks. 3.Advanced encryption standard ThisencryptionmethodwascreatedbytwoBelgian cryptographers in the year 2002 [5]. All the drawbacks faced with data encryption standard was being answered with this encryption technique. The block size of AES was 128 bits and increases with the increase in difficulty. 4.CRYPTOMATOR Cryptomator is used to secure the cloud storage data. This is an open source and support encryption for cloud storage files from client side. The tool is easy to use and support every kind of cloud storage. As these follows client side encryption this ensures that data is encrypted and then being synchronized with online cloud storage service.
IV.Options out there The cloud encryption tools helps in encrypting and providingbettersecuritytowardstheinformation stored in the system. The types of tools can be used are as follows: Boxcryptor:thisisaGermanbasedencryption softwareavailableforcloudandisfamousfor fermium and user friendly interface. This tool works by taking control over the cloud storage and reducing security breaches. With the help of this tool the user can use end to end encryption protocol. This is used to encrypt the online activity taking place within the desktop [15]. The algorithm used for this includes combination of RSA and AES encryption. Cryptomator:thisisthebestencryptiontool. Moreover, it is free and open source. User is allowed to configure the personal desire. The main advantage ofcryptomatoristhatitprovidestransparent encryption.in addition to this the protocol used for encryption in cryptomator is military grade. These ensures that the account is being protected from brute force. V.Encryption technique This is necessary to understand the security provided by the encryption methods to the cloud server. In this report I have performedaseriesoftestsinordertounderstandthe encryption method and working of the encryption method. Oneofthemostreliableandopensourceencryption Cryptomotar is being tested [2]. Cryptomator allows easy access and supports cloud storage. Cryptomator is used for encryption from client side. This ensures that no data leaves the computerwithoutbeing encrypted.Withthehelpof cryptomator whole cloud storage of the user can be easily encrypted. Even these allows creating multiple vault for single cloudstorageprovider.Thishelpstheusertomaintain different vaults for different purposes. Cryptomator is used to encrypt the data stored within the cloud whereas it is not necessary that the data needs to be stored within the cloud. This can also use to encrypt the data stored within some external drive [1]. The size of the vault may vary from size to size and this will not affect the performance. The security provided with this encryption technique is high. Cryptomator encrypts all the data stored within file with the use of AES. This also ensures that it provides protection from bruteforce attacks by using the Scrypt. Scrypt is basically a password based key derivation function and is designed so that it can stop the attackers from entering or reading the text.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
VI.Security model This is necessary to have a better security system that will help in providing better security. I have added two security model that will be beneficial for cloud storage system.Thereareseveralsecuritythreatsthatare associated with cloud data services includes threats such asnetworkeavesdropping,sidechannelattacks.The security model consist of three phase defence structure that determines the data security within the cloud system. Thefirstphaseworksbymaintainingstrong authentication system. This uses OTP as a two factor authentication system [3].The second phase includes a stronger algorithm to maintain better encryption. The third and the last phase includes recovering of data faster. VII.RECOMMENDATION In the report I have recommended AES and RSA for encrypting a data. According to me, it is better to choose an appropriate cloud architecture that will help in providing better security towards the cloud server. In providing better encryption method the organization can use cryptomator. With the help of encryption one can protect the data stored in the database. It is important to understand the need of encryption. REFERENCES [1.]"What is Advanced Encryption Standard (AES)? - DefinitionfromWhatIs.com",SearchSecurity, 2018.[Online].Available: https://searchsecurity.techtarget.com/definition/Ad vanced-Encryption-Standard. [Accessed: 20- Nov- 2018]. [2.]"WhatisEncryption?-Definitionfrom Techopedia",Techopedia.com,2018.[Online]. Available: https://www.techopedia.com/definition/5507/encr yption. [Accessed: 20- Nov- 2018]. [3.]Ahmad, I., Namal, S., Ylianttila, M. and Gurtov, A., 2015. Security in software defined networks: Asurvey.IEEECommunicationsSurveys& Tutorials,17(4), pp.2317-2346. [4.]Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges.Information sciences,305, pp.357-383. [5.]Almorsy, M., Grundy, J. and Müller, I., 2016. An analysisofthecloudcomputingsecurity problem.arXiv preprint arXiv:1609.01107. [6.]Andersson, R., 2016. Hardwiring the frontier? The politics of security technology in Europe’s ‘fight againstillegalmigration’.Security Dialogue,47(1), pp.22-39. [7.]Bennett, C.H. and Brassard, G., 2014. Quantum cryptography:Publickeydistributionandcoin tossing.Theor. Comput. Sci.,560(P1), pp.7-11. [8.]Bose, J.S.C. and Gopinath, G., 2015. An ETC System Using Advanced Encryption Standard and ArithmeticCoding.Middle-EastJournalof Scientific Research,23(5), pp.932-935. [9.]Cao, Y. and Bai, J., 2015, October. A passive attackagainstanasymmetrickeyExchange
Protocol.InComputerScienceandMechanical Automation(CSMA),2015International Conference on(pp. 45-48). IEEE. [10.]cyberduck.io (2018). Cryptomator. [online] Cyberduck.io.Availableat: https://cyberduck.io/cryptomator/[Accessed20 Nov. 2018]. [11.]Hong, J.B. and Kim, D.S., 2016. Assessing the effectiveness of moving target defenses using securitymodels.IEEETransactionson Dependable and Secure Computing, (1), pp.1-1. [12.]Horalek, J. and Sobeslav, V., 2018, August. AnalysisoftheUseofSystemResourcesfor Cloud Data Security. In International Conference onMobileWebandIntelligentInformation Systems (pp. 101-111). Springer, Cham. [13.]Klimoski, R., 2016. Critical success factors forcybersecurityleaders:Notjusttechnical competence.People and Strategy,39(1), p.14. [14.]Lindell, Y. and Katz, J., 2014.Introduction to modern cryptography. Chapman and Hall/CRC. [15.]Mainanwal, V., Gupta, M. and Upadhayay, S.K., 2015, March. A survey on wireless body area network: Security technology and its design methodology issue. InInnovations in information, embedded and communication systems (ICIIECS), 2015 international conference on(pp. 1-5). IEEE. [16.]Sen, J., 2015. Security and privacy issues in cloud computing. InCloud Technology: Concepts, Methodologies, Tools, and Applications(pp. 1585- 1630). IGI Global. [17.]VanTilborg,H.C.andJajodia,S.eds., 2014.Encyclopedia of cryptography and security. Springer Science & Business Media. [18.]Mukhopadhyay,D.,2017.Cryptography: AdvancedEncryptionStandard (AES).EncyclopediaofComputerScienceand Technology, p.279.