Securing User Data in Cloud Computing Utilizing Encryption Algorithms
VerifiedAdded on 2023/01/11
|8
|2054
|51
Report
AI Summary
This report delves into the critical aspects of cloud computing security, addressing the challenges and mechanisms involved in protecting user data. The study explores the shift of information technology to the cloud and the subsequent need for robust security measures. The report highlights various security concerns, including data integrity, lack of physical security, and the importance of data encryption. It proposes a framework utilizing encryption algorithms such as RSA, AES, DES, and Blowfish to enhance data security. The document offers a comparative analysis of these algorithms, discussing their applications and effectiveness within a cloud computing environment. The conclusion emphasizes the increasing demand for cloud services and the significance of user and cloud security, suggesting the proposed algorithms as helpful solutions for the current security demands. The report concludes with a bibliography of relevant research papers.

Running head: CLOUD COMPUTING
CLOUD COMPUTING
Name of the Student
Name of the Organization
Author Note
CLOUD COMPUTING
Name of the Student
Name of the Organization
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CLOUD COMPUTING
Securing User Data In Computing of Cloud Utilising The Algorithm
of Encryption
Introduction
Cloud computing is mostly known to be totally transforming the information technology
or IT. As it has been observed that a huge number of information and a number of processes are
being to have been migrating to the cloud, it is not just transforming wherever computing is seen
to be done, it is also about how actually it is done. As it is known that there is a great increment
in both the academic worlds and also the corporate one which are actually investing a huge
amount of money for this particular specialised as well as advanced technology, it is hugely
altering the working environment for almost all the professionals of information technology in a
drastic manner. Cloud computing is providing with significant solutions to a large number of
problems which are related to computing which is very much conventional including proper
handling of several peak loads, software’s update installation and using several excessive
computing cycles. However, this specific technology has also been seen to have created a huge
number of totally new challenges data security, trans-code data storage and also the proper
ownership of data. In this particular study, there is a proper discussion especially made about all
kinds of different issues related to the security, several mechanisms and a huge number of
challenges offered by cloud which are actually linked or rather related to the cloud computing
which is often faced by a rathe provider of service mainly during the cloud computing. This
particular study has even presented a specific study mainly a metamorphic one about different
kinds of security algorithms.
Securing User Data In Computing of Cloud Utilising The Algorithm
of Encryption
Introduction
Cloud computing is mostly known to be totally transforming the information technology
or IT. As it has been observed that a huge number of information and a number of processes are
being to have been migrating to the cloud, it is not just transforming wherever computing is seen
to be done, it is also about how actually it is done. As it is known that there is a great increment
in both the academic worlds and also the corporate one which are actually investing a huge
amount of money for this particular specialised as well as advanced technology, it is hugely
altering the working environment for almost all the professionals of information technology in a
drastic manner. Cloud computing is providing with significant solutions to a large number of
problems which are related to computing which is very much conventional including proper
handling of several peak loads, software’s update installation and using several excessive
computing cycles. However, this specific technology has also been seen to have created a huge
number of totally new challenges data security, trans-code data storage and also the proper
ownership of data. In this particular study, there is a proper discussion especially made about all
kinds of different issues related to the security, several mechanisms and a huge number of
challenges offered by cloud which are actually linked or rather related to the cloud computing
which is often faced by a rathe provider of service mainly during the cloud computing. This
particular study has even presented a specific study mainly a metamorphic one about different
kinds of security algorithms.

2CLOUD COMPUTING
Security Issues
Security is considered as one of the main aspects which are highly critical as per
computing of everyday is thought of, and it is not different from the cloud computing due to the
importance of data storage as well as sensitivity upon the cloud. The particular infrastructure of
the computing of cloud usually utilises a huge number of services as well as technologies which
are fully new and almost all of them are not totally evaluated as per security is taken into
account. Cloud computing has a large number of concerns and issues as well like the data
security, rules, trust and some kinds of performance issues. One issue can be related to the
computing of cloud which is that there may be chances that management of data may not be fully
trustworthy. A large number of risks from the insiders which are highly malicious into the cloud
and the failure of cloud service have received a strong attention by different enterprises. There
are some serious concerns which are related to the security of the cloud computing. The first one
is that with the help of cloud, there is a lack of physical security which has been noticed because
of the sharing of resources with different enterprises. There is no proper knowledge regarding
where to actually run all of the resources. The second security concern is that there is no
presence of a standard mainly a common one for ensuring proper data integrity. Ensuring
integrity of data actually means that it changes only with the response to several authorised
transactions. The third security concern is that there is always a huge chance of massive damage
to the reputation of all cloud service providers if there are any kinds of privacy which are totally
violated. A number of concerns are seen to be arising whenever there is no appropriate clearance
to all individuals about a particular reason which says why all of their personal information are
requested or rather passed upon different other parties. The fourth concern related to security
arises a number of questions regarding who is actually controlling all the keys of either
Security Issues
Security is considered as one of the main aspects which are highly critical as per
computing of everyday is thought of, and it is not different from the cloud computing due to the
importance of data storage as well as sensitivity upon the cloud. The particular infrastructure of
the computing of cloud usually utilises a huge number of services as well as technologies which
are fully new and almost all of them are not totally evaluated as per security is taken into
account. Cloud computing has a large number of concerns and issues as well like the data
security, rules, trust and some kinds of performance issues. One issue can be related to the
computing of cloud which is that there may be chances that management of data may not be fully
trustworthy. A large number of risks from the insiders which are highly malicious into the cloud
and the failure of cloud service have received a strong attention by different enterprises. There
are some serious concerns which are related to the security of the cloud computing. The first one
is that with the help of cloud, there is a lack of physical security which has been noticed because
of the sharing of resources with different enterprises. There is no proper knowledge regarding
where to actually run all of the resources. The second security concern is that there is no
presence of a standard mainly a common one for ensuring proper data integrity. Ensuring
integrity of data actually means that it changes only with the response to several authorised
transactions. The third security concern is that there is always a huge chance of massive damage
to the reputation of all cloud service providers if there are any kinds of privacy which are totally
violated. A number of concerns are seen to be arising whenever there is no appropriate clearance
to all individuals about a particular reason which says why all of their personal information are
requested or rather passed upon different other parties. The fourth concern related to security
arises a number of questions regarding who is actually controlling all the keys of either
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CLOUD COMPUTING
decryption or encryption. There is even some other concern relate to security which is specially
defined in the PCI DSS logs of data are to be provided to all of the security managers and also to
all the regulators.
Proposed Work Planning
There has been a proposed plan of work which involves a huge number of algorithms of
security for the elimination of different concerns related to the data loss and also privacy during
the particular access of the web application upon the cloud. A large number of algorithms are
used like RSA, Blowfish and DES within this particular study. Even a comparative study has
been properly depicted for ensuring security of data upon the cloud. All these algorithms are
actually all the main algorithms which are particularly symmetric within which a specific key is
used for both the encryption and decryption of several messages.
RSA Algorithm
The algorithm of RSA is mainly utilised for making sure about the security of data in the
cloud computing. In this specific algorithm, data is encrypted for offering security. The main
purpose of providing security to the data is that all the users who are specially authorised are
finally able to access it. After encryption has been done, data is seen to be stored into the cloud
so that whenever it will be required then a request will be placed to the cloud provider. After that
the cloud provider will authenticate the user and then data will be delivered the particular user.
RSA is mainly a block Cipher in which every message is to be mapped clearly to a specific
integer. Within the environment of the cloud which is proposed, the key which is public is
known to all but the key which is private is known by only a particular user who is owning data.
Hence, encryption is mainly done by the provider of service of the cloud and the decryption is
decryption or encryption. There is even some other concern relate to security which is specially
defined in the PCI DSS logs of data are to be provided to all of the security managers and also to
all the regulators.
Proposed Work Planning
There has been a proposed plan of work which involves a huge number of algorithms of
security for the elimination of different concerns related to the data loss and also privacy during
the particular access of the web application upon the cloud. A large number of algorithms are
used like RSA, Blowfish and DES within this particular study. Even a comparative study has
been properly depicted for ensuring security of data upon the cloud. All these algorithms are
actually all the main algorithms which are particularly symmetric within which a specific key is
used for both the encryption and decryption of several messages.
RSA Algorithm
The algorithm of RSA is mainly utilised for making sure about the security of data in the
cloud computing. In this specific algorithm, data is encrypted for offering security. The main
purpose of providing security to the data is that all the users who are specially authorised are
finally able to access it. After encryption has been done, data is seen to be stored into the cloud
so that whenever it will be required then a request will be placed to the cloud provider. After that
the cloud provider will authenticate the user and then data will be delivered the particular user.
RSA is mainly a block Cipher in which every message is to be mapped clearly to a specific
integer. Within the environment of the cloud which is proposed, the key which is public is
known to all but the key which is private is known by only a particular user who is owning data.
Hence, encryption is mainly done by the provider of service of the cloud and the decryption is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CLOUD COMPUTING
done by the cloud user. As soon as the data will be encrypted with the particular key which made
public, it is decrypted with the help of the corresponding private key.
AES Algorithm
AES algorithm is also called Rijindael and it is mainly used for the purpose of the
security of information. It is actually a block cipher which is particularly symmetric which has
been analysed and widely used in the current days. At first, the user is seen to be taking decision
for utilising all the cloud services and will also be migrating data upon the cloud. After that the
user will submit all the service needs with the provider of service of cloud and will be finally
opting for the services which will be appropriately suited which will be mainly offered by the
provider. Once encryption has been done, data will be then finally uploaded in the cloud. Any
type of request for data reading will occur after decryption has occurred on particularly the user
end and then a plain text will be read by the user. AES has replaced the DES as a particular
standard which is greatly approved for a wide range of applications.
DES Algorithm
DES is also a block cipher as well which mainly capable of encrypting data in a number
of blocks having size of about 64bits each. This type of plain text will be mainly going as input
to the DES and this will be producing a cipher text of about 64bits. A common algorithm as well
as key will be used for encryption and decryption with a very little difference in between them.
Hence, it can be said that DES is mainly a symmetric key algorithm.
Blowfish Algorithm
Blowfish algorithm is mainly an algorithm of symmetric key which is a cryptographic
one. It is capable of encrypting blocks of about 64bit having a key length which is highly
done by the cloud user. As soon as the data will be encrypted with the particular key which made
public, it is decrypted with the help of the corresponding private key.
AES Algorithm
AES algorithm is also called Rijindael and it is mainly used for the purpose of the
security of information. It is actually a block cipher which is particularly symmetric which has
been analysed and widely used in the current days. At first, the user is seen to be taking decision
for utilising all the cloud services and will also be migrating data upon the cloud. After that the
user will submit all the service needs with the provider of service of cloud and will be finally
opting for the services which will be appropriately suited which will be mainly offered by the
provider. Once encryption has been done, data will be then finally uploaded in the cloud. Any
type of request for data reading will occur after decryption has occurred on particularly the user
end and then a plain text will be read by the user. AES has replaced the DES as a particular
standard which is greatly approved for a wide range of applications.
DES Algorithm
DES is also a block cipher as well which mainly capable of encrypting data in a number
of blocks having size of about 64bits each. This type of plain text will be mainly going as input
to the DES and this will be producing a cipher text of about 64bits. A common algorithm as well
as key will be used for encryption and decryption with a very little difference in between them.
Hence, it can be said that DES is mainly a symmetric key algorithm.
Blowfish Algorithm
Blowfish algorithm is mainly an algorithm of symmetric key which is a cryptographic
one. It is capable of encrypting blocks of about 64bit having a key length which is highly

5CLOUD COMPUTING
variable of about 128-448 bits. The rate of encryption of the algorithm of Blowfish upon the
32bit microprocessor is quite faster and it is about 26 cycles of the clock per byte. It can be able
to execute within about less than 5kb of memory. It utilises only those operations which are
totally primitive like the addition or the XOR one and this has made both the implementation and
also the design very much simple. Blowfish algorithm has the lowest need for the memory. The
DES algorithm consumes the lowest encryption time and on the other hand the RSA algorithm
mainly consumes the longest memory size and also encryption time.
Conclusion
It can be concluded that in the recent era, a huge cloud demand has been noticed to be
increasing and therefore security of both user and the cloud has been considered to be top topic
which is to be concerned. Hence, all of these algorithms which are seen to have been proposed
are really very much helpful for all the needs of the recent times. In the nearer future, there will
be a huge number of comparisons with a variety of approaches and also results for clearly
showing the great effectiveness of the structure or the framework which is has been proposed can
be offered with a great ease.
variable of about 128-448 bits. The rate of encryption of the algorithm of Blowfish upon the
32bit microprocessor is quite faster and it is about 26 cycles of the clock per byte. It can be able
to execute within about less than 5kb of memory. It utilises only those operations which are
totally primitive like the addition or the XOR one and this has made both the implementation and
also the design very much simple. Blowfish algorithm has the lowest need for the memory. The
DES algorithm consumes the lowest encryption time and on the other hand the RSA algorithm
mainly consumes the longest memory size and also encryption time.
Conclusion
It can be concluded that in the recent era, a huge cloud demand has been noticed to be
increasing and therefore security of both user and the cloud has been considered to be top topic
which is to be concerned. Hence, all of these algorithms which are seen to have been proposed
are really very much helpful for all the needs of the recent times. In the nearer future, there will
be a huge number of comparisons with a variety of approaches and also results for clearly
showing the great effectiveness of the structure or the framework which is has been proposed can
be offered with a great ease.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CLOUD COMPUTING
Bibliography
[1] H.T. Dinh, C. Lee, D. Niyato and P. Wang. A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), pp.1587-1611, 2013.
[2] R. Arora, A. Parashar and C.C.I Transforming. Secure user data in cloud computing using
encryption algorithms. International journal of engineering research and applications, 3(4),
pp.1922-1926, 2013.
[3] N. Fernando, S.W Loke and W. Rahayu. Mobile cloud computing: A survey. Future
generation computer systems, 29(1), pp.84-106, 2013.
[4] J.W. Rittinghouse and J.F. Ransome. Cloud computing: implementation, management, and
security. CRC press, 2016.
[5] Fernando, N., Loke, S.W. and Rahayu, W., 2013. Mobile cloud computing: A survey. Future
generation computer systems, 29(1), pp.84-106.
[6] Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), pp.1922-1926.
[7] M. Whaiduzzaman, M. Sookhak, A. Gani, A. and R. Buyya. A survey on vehicular cloud
computing. Journal of Network and Computer applications, 40, pp.325-344, 2014.
[8] S. Carlin and K. Curran. Cloud computing security. In Pervasive and Ubiquitous Technology
Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global, 2013.
[9] A. Botta, W. De Donato, V. Persico and A. Pescapé. Integration of cloud computing and
internet of things: a survey. Future generation computer systems, 56, pp.684-700, 2016.
[10] K. Hashizume, D.G. Rosado, E. Fernández-Medina and E.B. Fernandez. An analysis of
security issues for cloud computing. Journal of internet services and applications, 4(1), p.5,
2013.
Bibliography
[1] H.T. Dinh, C. Lee, D. Niyato and P. Wang. A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), pp.1587-1611, 2013.
[2] R. Arora, A. Parashar and C.C.I Transforming. Secure user data in cloud computing using
encryption algorithms. International journal of engineering research and applications, 3(4),
pp.1922-1926, 2013.
[3] N. Fernando, S.W Loke and W. Rahayu. Mobile cloud computing: A survey. Future
generation computer systems, 29(1), pp.84-106, 2013.
[4] J.W. Rittinghouse and J.F. Ransome. Cloud computing: implementation, management, and
security. CRC press, 2016.
[5] Fernando, N., Loke, S.W. and Rahayu, W., 2013. Mobile cloud computing: A survey. Future
generation computer systems, 29(1), pp.84-106.
[6] Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), pp.1922-1926.
[7] M. Whaiduzzaman, M. Sookhak, A. Gani, A. and R. Buyya. A survey on vehicular cloud
computing. Journal of Network and Computer applications, 40, pp.325-344, 2014.
[8] S. Carlin and K. Curran. Cloud computing security. In Pervasive and Ubiquitous Technology
Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global, 2013.
[9] A. Botta, W. De Donato, V. Persico and A. Pescapé. Integration of cloud computing and
internet of things: a survey. Future generation computer systems, 56, pp.684-700, 2016.
[10] K. Hashizume, D.G. Rosado, E. Fernández-Medina and E.B. Fernandez. An analysis of
security issues for cloud computing. Journal of internet services and applications, 4(1), p.5,
2013.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CLOUD COMPUTING
[11] Z. Xiao, W. Song and Q. Chen. Dynamic resource allocation using virtual machines for
cloud computing environment. IEEE transactions on parallel and distributed systems, 24(6),
pp.1107-1117, 2013.
[12] Z. Xiao and Y. Xiao. Security and privacy in cloud computing. IEEE communications
surveys & tutorials, 15(2), pp.843-859, 2013.
[11] Z. Xiao, W. Song and Q. Chen. Dynamic resource allocation using virtual machines for
cloud computing environment. IEEE transactions on parallel and distributed systems, 24(6),
pp.1107-1117, 2013.
[12] Z. Xiao and Y. Xiao. Security and privacy in cloud computing. IEEE communications
surveys & tutorials, 15(2), pp.843-859, 2013.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.