Cloud Security and Privacy – A Cryptographic Approach
Recently, cloud computing emerged as the leading technology for delivering reliable, secure, fault-tolerant, sustainable, and scalable computational services, which are presented as Software, Infrastructure, or Platform as services (SaaS, IaaS, PaaS). Moreover, these services may be offered in private data centers (private clouds), may be commercially offered for clients (public clouds) or yet it is possible that both public and private clouds are combined in hybrid clouds. As the user data is stored in some undisclosed location upon which the user does not have any control, it creates the atmosphere of vulnerability of security and privacy of user data. In this paper we have highlighted some of the security and privacy issues in cloud and the role of cryptography in mitigating those issues.
How to cite this article:
Bal PK. Cloud Security and Privacy – A Cryptographic Approach. J Engr Desg Anal 2020; 3(2): 98-100.
Kantarcioglu M, Bensoussan A, Sing R. Impact of Security Risks on Cloud Computing Adoption. In proceeding of IEEE International Conference on Communication. Control and Computing 2011; 670-674.
Mohemed Almorsy, John Grundy and Amani S. Ibrahim. Collaboration-Based Cloud Computing Security Management Framework. In proceeding of IEEE International Conference on Cloud Computing. 2011; 364-371.
Shaikh FB, Haider S. Security Threats in Cloud Computing. In proceeding of IEEE International Conference on Internet Technology and Secured Transactions. 2011; 214-219.
Hay B, Nance K, Bishop M. Storm Clouds Rising: Security Challenges for laaS Cloud Computing. Proceedings of the 44th Hawaii International Conference on System ciences. 2011; 1-7.
Maha TEBAA, Satd EL HAJJI, Abdellatif EL GHAZI. Homomorphic Encryption Applied to the Cloud Computing Security. World Congress on Engineering 2012; 1.
Curran K, Carlin S, Adams M. Security issues in cloud computing. Elixir Network Engg 2011; 38: 4069-4072.
Kaur R, Kinger S. Analysis of Security Algorithms in Cloud Computing. International Journal of Application or Innovation in Engineering & Management 2014; 3: 171-117.
Nigoti R, Jhuria M, Singh S. A Survey of Cryptographic algorithms for Cloud Computing. International Journal of Emerging Technologies in Computational and Applied Sciences 2013; 4: 141-146.
Hayward R, Chiang CC. Parallelizing fully homomorphic encryption for a cloud environment. Journal of applied research and technology 2015; 13(2): 245-252.
Wang WJ, Ren L, Chen L et al. Intrusion Detection and Security Calculation in Industrial Cloud Storage based on an lmproved Dynamic Immune Algorithm. Information Sciences. 2018.
Copyright (c) 2021 Journal of Engineering Design and Analysis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.