05-06-2013, 03:47 PM
Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing
Applying Encryption.pdf (Size: 661.77 KB / Downloads: 86)
Abstract
Cloud computing is the next big thing after internet in the field of
information technology; some say it’s a metaphor for internet. It
is an Internet-based computing technology, in which software,
shared recourses and information, are provided to consumers and
devices on-demand, and as per users requirement on a pay per
use model. Even though the cloud continues to grow in
popularity, Usability and respectability, Problems with data
protection and data privacy and other Security issues play a
major setback in the field of Cloud Computing. Privacy and
security are the key issue for cloud storage. Encryption is a well
known technology for protecting sensitive data. Use of the
combination of Public and Private key encryption to hide the
sensitive data of users, and cipher text retrieval. The paper
analyzes the feasibility of the applying encryption algorithm for
data security and privacy in cloud Storage.
Introduction
Cloud computing is a flexible, cost- effective and proven
delivery platform for providing business or consumer IT
services over the Internet. Cloud computing supports
distributed service oriented architecture, multi-users and
multi-domain administrative infrastructure, it is more
prone to security threats and vulnerabilities. At present, a
major concern in cloud adoption is its security and
Privacy. Intrusion prospects within cloud environment are
many and with high gains. Security and Privacy issues are
of more concern to cloud service providers who are
actually hosting the services. In most cases, the provider
must guarantee that their infrastructure is secure and
clients’ data and applications are safe by implementing
security policies and mechanisms. While the cloud
customer must ensure that provider has taken proper
security measures to protect their information.
Cloud Computing Framework
Service Models: These three are the most widely used
service models of cloud computing.
Software as a service.
Software-as-a-Service (SaaS): It is also referred as
software available on demand, it is based on multi-tenant
architecture. Software like word processor, CRM
(Customer Relation Management), etc. or application
services like schedule, calendar, etc. are executed in the
“cloud” using the interconnectivity of the internet to do
manipulation on data. Custom services are combined with
3rd party commercial services via Service oriented
architecture to create new applications. It is a software
delivery for business applications like accounting, content
delivery, Human resource management (HRM), Enterprise
resource planning (ERP) etc on demand on pay-as-you go
model[1].
Platform as a Service.
Platform-as-a-Service (PaaS): This layer of cloud provides
computing platform and solution stack as service.
Platform-as-a-Service provides the user with the freedom
of application design, application development, testing,
deployment and hosting as well as application services
such as team collaboration, web service integration and
database integration, security, scalability, storage,
persistence, state management, application versioning,
without thinking about the underlying hardware and
software layers by providing facilities required for
completion of project through web application and services
via Internet.
Issues in Cloud Data Storage.
Cloud Computing moves the application software and
databases to the large data centers, where the management
of the data and services may not be fully trustworthy. This
unique attribute, however, poses many new security
challenges which have not been well understood. In this
article, we focus on cloud data storage security, which has
always been an important aspect of quality of service. To
ensure the correctness of users’ data in the cloud.
Trust: Trust is defined as
reliance on the integrity, strength, ability and surety of a
person or thing. Entrusting your data on to a third party
who is providing cloud services is an issue. Recent
incidents like In April of 2012 Amazon's Elastic Compute
Cloud service crashed during a system upgrade, knocking
customers' websites off-line for anywhere from several
hours to several days. That same month, hackers broke into
the Sony PlayStation Network, exposing the personal
information of 77 million people around the world. And in
June a software glitch at cloud-storage provider Dropbox
temporarily allowed visitors to log in to any of its 25
million customers' accounts using any password or none at
all. These issues have certainly created doubts in mind of
cloud consumers and damaged the trust ability of
Consumers [4].
Conclusion
Our research indicates that that Security and Privacy are
the major issues that are needed to be countered, efforts
are being made to develop many efficient System That can
Provide Security and privacy at the user level and maintain
the trust and intellectual property rights of the user. Our
method States Encryption is one such method that can
provide peace of mind to user and if the user have control
over encryption and decryptions of data that will boost
consumer confidence and attract more people to cloud
platform.