Cloud Computing - Security Challenges & Encryption Pratices
Cloud Computing - Security Challenges & Encryption Pratices
net/publication/306065687
CITATIONS READS
25 3,043
1 author:
Subhasri Prabhakaran
Alagappa University
12 PUBLICATIONS 44 CITATIONS
SEE PROFILE
All content following this page was uploaded by Subhasri Prabhakaran on 12 August 2016.
Abstract— Cloud computing is a new era of the modern world. Reasons for development of cloud computing are
different people and different purpose depends upon the demand. The improvement of the cloud technology also
increases the security issues twice. So we need to solve the security issues in the cloud technology. In this paper, we
have discussed about cloud computing security mechanisms and presented the comparative study of several
algorithms. In future we are going to propose a new plan to solve security issues for both cloud providers and cloud
users.
Keywords— Cloud, Security, Encryption algorithms, Security issues
I. INTRODUCTION
Cloud is a broad solution that delivers IT as a service. Cloud computing is an internet based technology uses the
internet & central remote servers to support data and applications. It permits consumers and businesses putting to use
without installation and approach their personal files at any computer with internet access. Cloud computing also
provided shared resources like electricity distributed on the electrical grid. Before cloud computing, websites and server
based applications were executed on a specific system. The cloud computing flexibility is a function of the allocation of
resources on authority’s request. And the cloud computing provides the act of uniting.
A cloud is a large pool [1], of easily and accessible virtualized resources, such as hardware, development
platforms and/or services. These resources can be powerfully re-configured to arrange properly to a variable load scale,
and also permitting for an optimum resource use. This pool of resources is constituting a type exploited by a pay-per-use
model in which guarantees are hold out for acceptance by the infrastructure supply by means of usage Service-Level
Agreements(SLA). In the cloud, the end user is just using a very light device which is capable of using a network that
connects it to a server at some other location. The users do not need to store the data at its end as all the data is stored on
the remote server at some other place.
A cloud is a pattern of parallel and distributed system be composed of a collection of interconnected and virtualized
computers that are dynamically stipulation and presented as one or more unite computing resources established on
service level agreements found amongst negotiation between the service supplier and consumer. It uses remote services
through a network using various resources. It is basically meant to give maximum with the minimum resources i.e. the
user end is having the minimum hardware requirement but is using the maximum capability of computing. This is
possible only through this technology which requires and utilizes its resources in the best way.
The concept of cloud computing is linked closely with those of Information as a service (IaaS), Platform as a service
(PaaS), Software as service (SaaS) all of which means a service-oriented architecture. Here comes the first benefit of the
cloud computing i.e. it reduces cost of hardware that could have been used at user end. As there is no need to store data at
user's end because it is already at some other location. So instead of buying the whole infrastructure required to run the
processes and save bulk of data you are just renting the assets according to your requirement. The similar idea is behind
all cloud networks [2].
Comparison [19] among the RSA, Homomorphic encryption algorithms and DES, The Homomorphic
encryption algorithm and DES are scalable but RSA is not scalable. The security [18], the DES is fully secured for both
providers and client side but RSA security applied client side only likewise Homomorphic encryption algorithm security
applied cloud itself only.
The following table characteristic precedes the insecure issues. So we are using the effective authentication plan
to provide stronger security for both cloud providers and consumers.
TABLE 1
CHARACTERISTICS OF EXISTING ENCRYPTION ALGORITHMS
Character- DES RSA Homomorphic
istics Algorithm Algorithm Encryption
Platform Cloud Cloud Cloud
computing computing computing
Keys Used Same key is Different keys private key is
used for are used for used(without
encryption and encryption and decryption)
decryption decryption
Purpose. Purpose.
Scalability It is scalable Not scalable scalable
algorithm due decryption
to varying the
key size and
Block size.
Security Both providers Client side Cloud
applied to and client side only providers only
Authentica Message Robust Authentication
tion Type authentication authentication never used
used implemented
V. CONCLUSION
In Cloud computing technology there are a set of important policy issues, which include issues of privacy,
security, anonymity, telecommunications capacity, government surveillance, reliability among others. But the most
important between them is security and how cloud provider assures it. Generally, Cloud computing has several customers
such as ordinary users, academia, and enterprises who have different motivation to move to cloud. If cloud clients are
academia, security effect is on performance of computing and for them cloud provides a way to combine security and
performance. For enterprises the most important problem is also security but with different vision. For them high
performance may be not as critical as academia. So, as per the perspective of different users, the security point of view is
different.
This paper analyses the importance of security to cloud. We compared three algorithms namely Data Encryption
Standard (DES), RSA, Homomorphic encryption for data security in cloud. They are compared based on four characters;
key used scalability, security applied to, and authentication type. In future we are going to propose a backup plan to solve
security issues in both cloud providers and cloud consumers.
REFERENCES
[1] Cloud computing principles, systems and applications NICK Antonopoulos http://mgitech.wordpress.com.
[2] Cloud computing methodology, systems and applications lizhe wang, rajiv ranjan.http://www.unitiv.com.
[3] Gartner: Seven cloud-computing security risks InfoWorld 2008-07-02.
[4] C.N. Höfer and G. Karagiannis, “Cloud computing services: taxonomy and comparison”, Internet Serv Appl (2011)
[5] F.A.Alvi, B.S.Choudary, N.Jaferry,”Review on cloud computing security issues & challenges”, iaesjournal.com, vol
(2) (2012).
[6] Furht,B., and Escalante,A. (2010). Handbook of Cloud Computing. New York: Springer
http://searchcloudcomputing.techtarget.com/definition /private-cloud
[7] Jagpal Singh,Krishnan lal and Dr.Anil kumar Shrotiya, Journal of Computer Science and Applications., ISSN 2231-
1270 Volume 4, Number 1 (2012), pp. 1-7. http://www.irphouse.com
[8] Kevin Hamlen, Murat kantarcioglu, Latifur Khan and Bhavani Thurasingham, International Journal of Information
Security and Privacy, 4(2), p.p(39-51), April-June 2010.
[9] MANDEEP KAUR, MANISH MAHAJAN, “using encryption algorithms to enhance the data security in cloud
computing, “International journal of communication and computer technologies”, ISSN Number: 2278-9723.
[10] Maha TEBAA, Saïd EL HAJJI and Abdellatif EL GHAZI, “Homomorphic Encryption Applied to the Cloud
Computing Security”, Proceedings of the World Congress on Engineering 2012 Vol 1 WCE 2012, July 4 - 6, 2012,
London, U.K