A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

被引:0
|
作者
Mehmet Sabır Kiraz
机构
[1] Mathematical and Computational Sciences Labs TÜBİTAK BİLGEM,
关键词
Cloud computing; Security; Privacy; Cryptographic algorithms and protocols;
D O I
暂无
中图分类号
学科分类号
摘要
The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.
引用
收藏
页码:731 / 760
页数:29
相关论文
共 50 条
  • [21] An analysis of security issues for cloud computing
    Hashizume, Keiko
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Fernandez, Eduardo B.
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 13
  • [22] Analysis of Security Algorithms in Cloud Computing
    Agrawal, Tanvi
    Singh, S. K.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 106 - 108
  • [23] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [24] Security Analysis and Discussion of Cloud Computing
    Liu Zhi-fang
    Zhang Xue-hong
    12TH ANNUAL MEETING OF CHINA ASSOCIATION FOR SCIENCE AND TECHNOLOGY ON INFORMATION AND COMMUNICATION TECHNOLOGY AND SMART GRID, 2010, : 362 - +
  • [25] Security analysis of public cloud computing
    Idziorek, Joseph
    Tannian, Mark
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 9 (1-2) : 4 - 20
  • [26] An Analysis of Security Challenges in Cloud Computing
    Parekh, Disha H.
    Sridaran, R.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 38 - 46
  • [27] Cloud Computing Security Issues: An Analysis
    Gandhi, Komal
    Gandhi, Parul
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3858 - 3861
  • [28] Modeling and Analysis of Cloud Computing Security
    Meetei, Mutum Zico
    2017 11TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2017), 2017, : 288 - 292
  • [29] Mobile Cloud Computing: Security Analysis
    Gamlo, Amina H.
    Zhang, Ning
    Bamasag, Omaimah
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD), 2017, : 191 - 198
  • [30] An Analysis of Cloud Computing Security Issues
    Behl, Akhil
    Behl, Kanika
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 109 - 114