Skip to main content

2017 | OriginalPaper | Buchkapitel

Studying Security of Data in Cloud Computing Through Cryptographic Approach

verfasst von : Hosam F. El-Sofany, Samir A. El-Seoud

Erschienen in: Interactive Collaborative Learning

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is a set of IT services offered to users over the WWW on a rented base. Cloud computing has many advantages such as flexibility, efficiency, scalability, integration, and capital reduction. Moreover, it provides an advanced virtual space for organizations to deploy their applications and to run their systems. For secure communication over Cloud network, data can be protected by the method of encryption. Encryption exchanges that data by any encryption algorithm using the key in twisted form. Only user can access the key used to decrypt the encrypted data. The purpose of encryption is used to preventing leak or secrecy in communications. Encryption algorithms play a huge role in providing data security against bad and malicious attacks. This paper studies the basic concepts and analyzes the essentials of data security issues pertaining to Cloud Computing. Then we elaborate on each issue by discussing its nature. Specifically, we emphasize on issues of protecting data such as: data confidentiality, data integrity, data availability, securing data access, data auditing, enforcing the regulations and compliances regarding to data security and privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, Bangalore, pp. 109–116, 21–25 September 2009 Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, Bangalore, pp. 109–116, 21–25 September 2009
3.
Zurück zum Zitat Gens, F.: New IDC It Cloud Services Survey: Top Benefits and Challenges (2009) Gens, F.: New IDC It Cloud Services Survey: Top Benefits and Challenges (2009)
6.
Zurück zum Zitat AnoopMS, Publickey Cryptography (Applications Algorithm and Mathematical Explanations) AnoopMS, Publickey Cryptography (Applications Algorithm and Mathematical Explanations)
7.
Zurück zum Zitat Yan, L., Rong, C., Zhao, G.: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 167–177. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_15 CrossRef Yan, L., Rong, C., Zhao, G.: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 167–177. Springer, Heidelberg (2009). doi:10.​1007/​978-3-642-10665-1_​15 CrossRef
10.
Zurück zum Zitat Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, Hangzhou, pp. 647–651, 23–25 March 2012 Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, Hangzhou, pp. 647–651, 23–25 March 2012
12.
Zurück zum Zitat Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of the 2010 Asia Pacific Cloud Workshop, Australia, 30 November 2010 Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of the 2010 Asia Pacific Cloud Workshop, Australia, 30 November 2010
14.
Zurück zum Zitat Popović, K., Hocenski, Z.: Cloud computing security issues and challenges. In: Proceedings of the 33rd International Convention in MIPRO, pp. 344–349 (2010) Popović, K., Hocenski, Z.: Cloud computing security issues and challenges. In: Proceedings of the 33rd International Convention in MIPRO, pp. 344–349 (2010)
15.
Zurück zum Zitat Ramgovind, S., Elo, M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, Sandton, pp. 1–7, 2–4 August 2010 Ramgovind, S., Elo, M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, Sandton, pp. 1–7, 2–4 August 2010
17.
Zurück zum Zitat Heena, K., Chouhan, D.S.: Building trust in cloud using public key infrastructure- a step towards cloud trust. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 3(3), 26–31 (2012) Heena, K., Chouhan, D.S.: Building trust in cloud using public key infrastructure- a step towards cloud trust. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 3(3), 26–31 (2012)
18.
Zurück zum Zitat Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATH Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATH
Metadaten
Titel
Studying Security of Data in Cloud Computing Through Cryptographic Approach
verfasst von
Hosam F. El-Sofany
Samir A. El-Seoud
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-50340-0_38