Review of Cloud Computing Security: MITS6001 Article Analysis

Verified

Added on  2022/11/28

|6
|1418
|140
Report
AI Summary
This report analyzes a journal article that explores security challenges in cloud computing and proposes various encryption algorithms to ensure data reliability. The article defines cloud computing and highlights its advantages, such as agility and scalability, while also addressing security concerns like data transfer, software interfaces, and user access control. It identifies solutions to these issues, including secure data transfer, software interfaces, data separation, securing stored data, and user access control. The authors propose several security algorithms, including RSA, AES, DES, and Blowfish. The paper provides a systematic approach to understanding cloud computing, its security implications, and methods to enhance security. The report also includes references to other relevant articles in the field of cloud computing.
Document Page
name of student
name of college
authors note
CLOUD COMPUTING
1
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD COMPUTING
Analysis
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud
computing using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
In the current paper the authors focuses on providing information regarding security challenges
in cloud computing and helps in the identification of mechanism, challenges which are
experienced by cloud service providers within engineering in cloud and also proposes different
encryption algorithm so as to insure reliability of cloud data. The cloud computing is generally a
form of outsourcing of software, data repository and processing where users ingress applications
and information through logging into any machine which is connected with internet. Data and
applications are provided by third parties and inhabit universal arrangement for protected data
which promotes sharing and cooperation irrespective of location of user or machine utilised.
The authors define cloud computing as the capability to ingress large number of computing that
data are possessed and governed by a third party through the Internet. The authors believe that
cloud computing comprises of hardware, networks, storage, services and interfaces which
provide the platform for users to gain access to the o demand infrastructures, application,
services and computer power irrespective of their locations. The authors also help in highlighting
that computing in cloud generally comprise of the distribution, storage, and handling of data on
the third party’ arrangement, which is not declared in the administration process of customers.
The authors in the article also present that the concept of computing through the cloud is closely
related to service oriented architecture such as Information as a Service (IaaS), Platform as a
Service (PaaS), and Software as a Service (SaaS).1
The authors highlight fact that cloud computing have multiple advantages over traditional
computing which includes greater agility, lower cost of entry, independency among devices,
independency of location and scalability.2
1Nouf S. Aldahwan and Mohamed S. Saleh
2Thomas Chen, Chuang Ta-Tao, and.Kazuo Nakatani
2
Document Page
CLOUD COMPUTING
The first security issue which is associated with cloud computing is that it leads to loss of
physical security as a result of sharing of computing resources with other companies and there is
lack of idea and control regarding where resources run. The solution identified to solve the issues
is ensuring secure Data Transfer.3
The second security issue which is associated with computing in the cloud states that the concept
of ensuring data integration which includes transfer, storage, and retrieval relates to changes
which is associated in answer to transactions that are authorized as a mutual standard for
ensuring uprightness of data does not currently exists in cloud computing. The solution identified
to solve the issue is ensuring Software Interfaces which are secure.
The third security issue which is associated with computing is that the customers have the ability
to sue cloud service providers on grounds of violation of privacy rights, which may cause
damage of reputation of providers of cloud services. Concerns regarding cloud computing arises
when the customers do not have idea regarding the rational of requesting for their personal
information and query regarding how their information will be transferred to other parties. The
solution identified to solve the issue is ensuring separation of data.4
The fourth security issue which is associated with cloud computing is confusion regarding who
will control the encryption or decryption key but in all logical sense is should be the customers.
The solution identified to solve the issue is securing Stored Data.
The fifth security issue which is associated with cloud computing is that data logs must be
offered to the regulators and managers of security in cases of Payment Card Industry Data
Security Standard (PCI DSS). The solution which is identified to solve the issue is ensuring user
access control.5
The authors propose various security algorithms for ensuring cloud data security. The first and
foremost public key algorithm which is proposed by the author is RSA, named after its inventors
Rivest, Shamir, and Adleman (RSA) which is mainly an encryption /decryption algorithm which
is unsymmetrical in nature, as in RSA, distribution of public key is done to all users via which a
3DarkoEtinger and Marijan Cingula
4IonelaBaltatescu, PhD.
5Manpreetkaur and Hardeep Singh.
3
Document Page
CLOUD COMPUTING
user has the authority to encrypt the message and private key used for decryption is not shared
with all users.6
The second public key algorithm which is proposed by the authors is Advanced Encryption
Standard (AES), also termed as Rijindael, is used for information security. AES is a symmetric
block cipher which has been largely and is utilized currently.
The third public key algorithm which is proposed by the authors is Data Encryption Standard
(DES) which is a block cipher. DES helps in data encryptionin64 bits block each which means
that plain text of size 64 bits is provided as input to DES that outputs cipher text of 64 bits.7
The fourth public key algorithm which is proposed by the authors is Blowfish which can be
termed as a key cryptographic algorithm which is symmetric in nature and encrypts 64 bit blocks
with a variable key of length ranging between 128-448 bits.8
After the analysis of the paper, it can be stated that the current paper can be considered of high
value as it progresses in a systematic manner regarding imparting ideas to the readers. Firstly the
authors offers definition of computing in cloud and elaborates the concept of computing in cloud
in order to provide the readers a background of cloud computing. After that the authors details
the advantages which are associated with cloud along with the security concerns associated with
cloud computing and the basic solution to those concerns. The authors lastly provide idea
regarding various encryption algorithms which can be utilized for securing the data in the cloud
so that the readers can full idea regarding how cloud computing can be made secured and utilized
in a maximum possible manner.
6SaurabhDey, Sampalli Srinivas and Qiang Ye
7SuneDueholm Müller, Rubaek Holm Stefan, and Jens Søndergaard
8Devesh Kumar, Harsh VardhanSamalia and PiyushVerma.
4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD COMPUTING
References
Aldahwan, Nouf S. and Mohamed S. Saleh. Developing a Framework for Cost-Benefit Analysis
of Cloud Computing Adoption by Higher Education Institutions in Saudi Arabia. Piscataway:
The Institute of Electrical and Electronics Engineers, Inc. (IEEE), 2018.
https://search.proquest.com/docview/2135294225?accountid=30552.
Baltatescu, Ionela, PhD. "Cloud Computing Services: Benefits, Risks and Intellectual Property
Issues *." Global Economic Observer 2, no. 1 (2014): 230-242.
https://search.proquest.com/docview/1679936360?accountid=30552.
Chen, Thomas, Ta-Tao Chuang, and Kazuo Nakatani. "The Perceived Business Benefit of Cloud
Computing: An Exploratory Study." Journal of International Technology and Information
Management 25, no. 4 (2016): 101-121. https://search.proquest.com/docview/1926954829?
accountid=30552.
Dey, Saurabh, Srinivas Sampalli, and Qiang Ye. "Security and Privacy Issues in Mobile Cloud
Computing." International Journal of Business and Cyber Security 1, no. 1 (07, 2016).
https://search.proquest.com/docview/1936245026?accountid=30552.
Etinger, Darko and Marijan Cingula. The Influence Of Cloud Computing Adoption Benefits On
Hotels' Competitive Capabilities.Varazdin Development and Entrepreneurship Agency
(VADEA),Varazdin, 2014. https://search.proquest.com/docview/1621414348?accountid=30552.
kaur, Manpreet and Hardeep Singh. "A Review of Cloud Computing Security
Issues." International Journal of Education and Management Engineering 5, no. 5 (10, 2015):
32. doi:http://dx.doi.org/10.5815/ijeme.2015.05.04.
https://search.proquest.com/docview/2123758392?accountid=30552.
Kumar, Devesh, VardhanSamalia Harsh, and Piyush Verma. "Exploring Suitability of Cloud
Computing for Small and Medium-Sized Enterprises in India." Journal of Small Business and
Enterprise Development 24, no. 4 (2017): 814-832. doi:http://dx.doi.org/10.1108/JSBED-01-
2017-0002. https://search.proquest.com/docview/1957086306?accountid=30552.
5
Document Page
CLOUD COMPUTING
Müller, SuneDueholm, Stefan Rubaek Holm, and Jens Søndergaard. "Benefits of Cloud
Computing: Literature Review in a Maturity Model Perspective." Communications of the
Association for Information Systems 37, (2015): 1.
https://search.proquest.com/docview/1763749472?accountid=30552.
6
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]