An In-Depth Analysis of Cryptography in Cloud Environments
Vol. 8, Jan-Dec 2022 | Page: 18-23
Abstract
Distributed computing conveys figuring administrations over the web instead of keeping records on a restrictive group drive or local memory drives. Processing administrations can incorporate workers, storage, information bases, systems administration, and programming. The fundamental explanation and extraordinary benefit of utilizing the cloud are that the client can store and access the put-away information whenever and get every one of its administrations for a minimal expense. Notwithstanding this, Security has consistently been a major worry with distributed computing because the client doesn't directly keep up with the data in the cloud. When the client transfers or stores information during a distributed computing system, the data proprietors will probably not comprehend how their information is being sent. The client is unconscious of whether the data is being gathered, examined, and got to by an outsider. To overcome the security issues, different cryptography techniques are proposed. This paper focused on distributed computing fundamentals and talked about additional cryptography calculations present in the current work.
References
- M. A. Vouk, “Cloud computing - Issues, research and implementations,” Proc. Int. Conf. Inf. Technol. Interfaces, ITI, pp. 31–40, 2008.
- P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
- S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011.
- Cloud Performance Evaluation: Hybrid Load Balancing Model Based on Modified Particle Swarm Optimization and Improved Metaheuristic Firefly AlgorithmsJune 2020International Journal of Advanced Science and Technology 29(5):12315-12331, Advin Manhar.
- C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, 2013.
- V. J. Winkler, “Securing the Cloud,” Cloud Comput. Secur. Tech. tactics. Elsevier., 2011.
- A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, “Security risks and their management in cloud computing,” 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012.
- T. Mather, S. Kumaraswamy, and S. Latif, “Cloud Security and Privacy,” p. 299, 2009.
- F. Yahya, V. Chang, J. Walters, and B. Wills, “Security Challenges in Cloud Storage,” pp. 1–6, 2014.
- VijayaPinjarkar, Neeraj Raja, KrunalJha,AnkeetDalvi, “Single Cloud Security Enhancement using key Sharing Algorithm, ”Recent and Innovation Trends in Computing and 2016Communication, 2016.
- V. Vankireddy, N. Sudheer, R. Lakshmi Tulasi, “Enhancing Security and Privacy in Multi Cloud Computing Environment,” International Journal of Computer Science and Information Technologies, 2015.
- Swapnila S Mirajkar, Santoshkumar Biradar, “Enhance Security in Cloud Computing,” International Journal of Advanced Research in Computer Science and Software Engineering,2014.
- Ashalatha R, “A survey on security as a challenge in cloud computing,”International Journal of Advanced Technology & Engineering Research (IJATER) National Conference on Emerging Trends in Technology,2012.
- G. L. Prakash, M. Prateek and I. Singh, ’Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System’, International Journal Of Engineering And Computer Science vol. 3, issue 4, pp. 5215- 5223, April 2014
- S Mahim, “secure file storage on cloud using cryptography”, Mumbai, 03 | Mar-2018
- Ahmed Albugmi Madini ,O. Alassafi Robert Walters, “Data Security in Cloud Computing”, 2016.
Neal Bhasin
Sri Venkateshwar International School, New Delhi
Received: 05-12-2021, Accepted: 30-01-2022, Published Online: 21-02-2022