logo

Secure and Efficient Search Techniques in Cloud Computing

   

Added on  2022-12-22

7 Pages1912 Words79 Views
Survey on various secure and efficient search techniques in Cloud
Computing
Secure and Efficient Search Techniques in Cloud Computing_1
PROFESSIONAL ISSUES OF IT 1
Introduction
The term cloud computing is defined as the information technology which
is now widely utilized in various business industries and companies.
Cloud-based services provided a platform to companies for storing a
large number of data sets and improve overall security or privacy of
user’s data [1]. Security is a key reason which increased the use of cloud
based services because it is more secure and efficient rather than other
technologies. The purpose of this research is to analyse the importance
of cloud technology and review safe and efficient search processes used
in cloud computing. Cloud is a new platform which is watched as a
process for huge storage and information technology that permits
consumers to do subtracting in an effective manner. This report will
conduct a literature review which helps for finding the viewpoints and
results of previous research studies.
Background of the research
The term cloud computing is a type of technology which includes
delivering hosted servers over the internet connectivity. There are major
three kinds of servers included in the case of cloud such as infrastructure
as a service, and platform as a service and software as a service [2]. It is
observed that in terms of secure cloud computing is an effective
technique that has the potential for reducing the rate of security threats
and risks. In the field of cloud computing for performing all needed
components, it is very significant that the information which has to be
performed in the computer system must be examined effectively which
make real use of computing services. With the help of this technology
companies can security the sensitive data and information on cloud-
based services [10].
Literature review
Cloud computing is one of the common topics for research and numbers
of authors provided their views on this topic. This literature review
Secure and Efficient Search Techniques in Cloud Computing_2
PROFESSIONAL ISSUES OF IT 2
focuses on the security search methods used in cloud techniques and
identifies how this technology improve the privacy of user's data.
According to Fu, et al., (2018) cloud computing mainly provided three
kinds of servers to their consumers such as SaaS, PaaS and IaaS. Mainly,
software as a service provides a platform to the consumers for using the
applications which are running on the cloud. Platform as a service
provides them with the ability to users for deploying onto the cloud
substructure and infrastructure as a service is an ability delivered to the
consumers that involve provision for processing information and
networks [3]. This journal paper identified that cloud computing protects
data and information of consumers by storing their data on cloud
infrastructure. Fu, Sun, Ji and Xie, (2016) identified that security issues
occurred when consumers use unauthentic servers and networks but
cloud computing is an advanced technology that reduced the level of
cyber-crimes. From this paper, it is observed that for managing the
security-related issues encryption technique can be used that has the
capability for converting data into a form code which cannot be accessed
by hackers. In the case of cloud computing for obtaining better search
results the major part of the system is indexing that provides better
sources for reducing security issues [4].
Guo, Liu, Cai, Xiao and Zhao, (2018) argued that the searchable
encryption technique is one of the best ways for solving the issue of
security and privacy search with improving the effectiveness of cloud
database. In this journal article, the authors reviewed searchable
encryption techniques for improving the security and privacy of data.
Mainly, encryption is parts of cryptography technology that support
users to securely improve the privacy of data and information [5]. First
encryption converts data into a code which require a private key for
accessing the data and information of consumers.
For designing and implementing search encryption technique cloud
computing required authentic servers and networks which is done by
delivering secret keys to consumers. The research identified that the key
Secure and Efficient Search Techniques in Cloud Computing_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Security Challenges
|15
|4893
|403

Information Security Assignment | Security and Privacy
|9
|2067
|44

Security and Privacy Issues and Prevention Methods in Cloud Computing
|4
|4001
|93

(PDF) Top Threats to Cloud Computing Security
|13
|2463
|122

Cyber Security Research Project 2022
|6
|2247
|27

Cloud Computing - Research Issues, Challenges, Architecture, Platforms and Applications: A Survey
|5
|4629
|338