Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing

نویسنده

  • Jissy Ann George
چکیده

Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt data and make it into an un-readable form, which can then be decrypted only with the help of a key. A number of cryptographic techniques are available for use in protection of data in various applications. Cryptographic techniques are essential for the confidentiality of the data saved. Cloud computing is used to share resource as service, software as service, infrastructure as service, platform as service to the clients. The use of cryptography in the cloud will enable the security of the data being shared. Confidentiality and integrity of data in data security are essential in the cloud. This paper presents an overview of the cryptographic techniques, security and privacy challenges related to public cloud computing. Keywords— Cloud computing, cryptographic techniques, domains, encryption, security issues, threats

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Top Benefits and Hindrances to Cloud Computing Adoption in Saudi Arabia: A Brief Study

Cloud computing is an emerging concept of information technology that in many countries has an influence on many companies. The research was conducted to evaluate cloud computing adoption in Saudi Arabia; Benefits and hindrances for small and medium-sized enterprises (SMEs). The qualitative research approach is performed by interviews with the management of a variety of SMEs active in the infor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015