Efficient and Enhanced Data Encryption In Cloud Computing
Keywords:
Cloud Computing, Cloud Platform, Data Privacy, Data Security, Models of Cloud Computing.Abstract
Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand. However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this project, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment. The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may not be trusted.
References
- G. Ateniese, K. Benson, and S. Hohenberger, 2009 ,“Key-private proxy Re-encryption,” in Topics in Cryptology–CT-RSA (Lecture Notesin Computer Science), vol. 5473. Berlin, Germany: Springer-Verlag, pp. 279-294.
- Sun Microsystems, 2009, “Introduction to Cloud Computing Architecture”, Sun Microsystems Inc., white paper, pp. 1-17
- MELL, P. and GRANCE, T, 2009. “Definition of Cloud Computing”, Draft NIST working, vol.5, pp. 7-19.
- J. Shao, 2012, “Anonymous ID-based proxy re-encryption,” in Information Security and Privacy (Lecture Notes in Computer Science), vol. 7372. Berlin, Germany: Springer-Verlag, pp. 364–375.
- Bellare, Mihir; Rogaway, Phillip (21 September 2005), “Introduction to Modern Cryptography, by random grids, vol.1, pp.10-21.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.