Skip to main content

Studying Security of Data in Cloud Computing Through Cryptographic Approach

  • Conference paper
  • First Online:
  • 1442 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 545))

Abstract

Cloud computing is a set of IT services offered to users over the WWW on a rented base. Cloud computing has many advantages such as flexibility, efficiency, scalability, integration, and capital reduction. Moreover, it provides an advanced virtual space for organizations to deploy their applications and to run their systems. For secure communication over Cloud network, data can be protected by the method of encryption. Encryption exchanges that data by any encryption algorithm using the key in twisted form. Only user can access the key used to decrypt the encrypted data. The purpose of encryption is used to preventing leak or secrecy in communications. Encryption algorithms play a huge role in providing data security against bad and malicious attacks. This paper studies the basic concepts and analyzes the essentials of data security issues pertaining to Cloud Computing. Then we elaborate on each issue by discussing its nature. Specifically, we emphasize on issues of protecting data such as: data confidentiality, data integrity, data availability, securing data access, data auditing, enforcing the regulations and compliances regarding to data security and privacy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Armbrust, M., Fox, A., Grith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010). http://dx.doi.org/10.1145/1721654.1721672

    Article  Google Scholar 

  2. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, Bangalore, pp. 109–116, 21–25 September 2009

    Google Scholar 

  3. Gens, F.: New IDC It Cloud Services Survey: Top Benefits and Challenges (2009)

    Google Scholar 

  4. http://blogs.idc.com/ie/?p=730

  5. Cloud Security Alliance (2010). Top threats to cloudcomputing, version1.0. http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

  6. AnoopMS, Publickey Cryptography (Applications Algorithm and Mathematical Explanations)

    Google Scholar 

  7. Yan, L., Rong, C., Zhao, G.: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 167–177. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_15

    Chapter  Google Scholar 

  8. Chappell, D.: A Short Introduction to Cloud Platforms. http://www.davidchappell.com/CloudPlatforms–Chappell.pdf

  9. Brodkin, J.: Gartner: Seven Cloud-Computing Security Risks, InfoWorld (2008). http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853

  10. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, Hangzhou, pp. 647–651, 23–25 March 2012

    Google Scholar 

  11. Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2011). http://dx.doi.org/10.1109/MSP.2010.115

    Article  Google Scholar 

  12. Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of the 2010 Asia Pacific Cloud Workshop, Australia, 30 November 2010

    Google Scholar 

  13. Leavitt, N.: Is cloud computing really ready for prime time? Computer 42(1), 15–20 (2009). http://dx.doi.org/10.1109/MC.2009.20

    Article  MathSciNet  Google Scholar 

  14. Popović, K., Hocenski, Z.: Cloud computing security issues and challenges. In: Proceedings of the 33rd International Convention in MIPRO, pp. 344–349 (2010)

    Google Scholar 

  15. Ramgovind, S., Elo, M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, Sandton, pp. 1–7, 2–4 August 2010

    Google Scholar 

  16. Kandukuri, B.R., Paturi, V.R., Rakshit, A.: Cloud security issues. In: Proceedings of the 2009 IEEE International Conference on Services Computing, Washington DC, pp. 517–520. 21–25 September 2009. http://dx.doi.org/10.1109/SCC.2009.84

  17. Heena, K., Chouhan, D.S.: Building trust in cloud using public key infrastructure- a step towards cloud trust. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 3(3), 26–31 (2012)

    Google Scholar 

  18. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hosam F. El-Sofany .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

El-Sofany, H.F., El-Seoud, S.A. (2017). Studying Security of Data in Cloud Computing Through Cryptographic Approach. In: Auer, M., Guralnick, D., Uhomoibhi, J. (eds) Interactive Collaborative Learning. ICL 2016. Advances in Intelligent Systems and Computing, vol 545. Springer, Cham. https://doi.org/10.1007/978-3-319-50340-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50340-0_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50339-4

  • Online ISBN: 978-3-319-50340-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics