Abstract
Cloud computing is a set of IT services offered to users over the WWW on a rented base. Cloud computing has many advantages such as flexibility, efficiency, scalability, integration, and capital reduction. Moreover, it provides an advanced virtual space for organizations to deploy their applications and to run their systems. For secure communication over Cloud network, data can be protected by the method of encryption. Encryption exchanges that data by any encryption algorithm using the key in twisted form. Only user can access the key used to decrypt the encrypted data. The purpose of encryption is used to preventing leak or secrecy in communications. Encryption algorithms play a huge role in providing data security against bad and malicious attacks. This paper studies the basic concepts and analyzes the essentials of data security issues pertaining to Cloud Computing. Then we elaborate on each issue by discussing its nature. Specifically, we emphasize on issues of protecting data such as: data confidentiality, data integrity, data availability, securing data access, data auditing, enforcing the regulations and compliances regarding to data security and privacy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Armbrust, M., Fox, A., Grith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010). http://dx.doi.org/10.1145/1721654.1721672
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, Bangalore, pp. 109–116, 21–25 September 2009
Gens, F.: New IDC It Cloud Services Survey: Top Benefits and Challenges (2009)
Cloud Security Alliance (2010). Top threats to cloudcomputing, version1.0. http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
AnoopMS, Publickey Cryptography (Applications Algorithm and Mathematical Explanations)
Yan, L., Rong, C., Zhao, G.: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 167–177. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_15
Chappell, D.: A Short Introduction to Cloud Platforms. http://www.davidchappell.com/CloudPlatforms–Chappell.pdf
Brodkin, J.: Gartner: Seven Cloud-Computing Security Risks, InfoWorld (2008). http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, Hangzhou, pp. 647–651, 23–25 March 2012
Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2011). http://dx.doi.org/10.1109/MSP.2010.115
Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of the 2010 Asia Pacific Cloud Workshop, Australia, 30 November 2010
Leavitt, N.: Is cloud computing really ready for prime time? Computer 42(1), 15–20 (2009). http://dx.doi.org/10.1109/MC.2009.20
Popović, K., Hocenski, Z.: Cloud computing security issues and challenges. In: Proceedings of the 33rd International Convention in MIPRO, pp. 344–349 (2010)
Ramgovind, S., Elo, M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, Sandton, pp. 1–7, 2–4 August 2010
Kandukuri, B.R., Paturi, V.R., Rakshit, A.: Cloud security issues. In: Proceedings of the 2009 IEEE International Conference on Services Computing, Washington DC, pp. 517–520. 21–25 September 2009. http://dx.doi.org/10.1109/SCC.2009.84
Heena, K., Chouhan, D.S.: Building trust in cloud using public key infrastructure- a step towards cloud trust. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 3(3), 26–31 (2012)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
El-Sofany, H.F., El-Seoud, S.A. (2017). Studying Security of Data in Cloud Computing Through Cryptographic Approach. In: Auer, M., Guralnick, D., Uhomoibhi, J. (eds) Interactive Collaborative Learning. ICL 2016. Advances in Intelligent Systems and Computing, vol 545. Springer, Cham. https://doi.org/10.1007/978-3-319-50340-0_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-50340-0_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50339-4
Online ISBN: 978-3-319-50340-0
eBook Packages: EngineeringEngineering (R0)