A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

被引:0
|
作者
Mehmet Sabır Kiraz
机构
[1] Mathematical and Computational Sciences Labs TÜBİTAK BİLGEM,
关键词
Cloud computing; Security; Privacy; Cryptographic algorithms and protocols;
D O I
暂无
中图分类号
学科分类号
摘要
The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.
引用
收藏
页码:731 / 760
页数:29
相关论文
共 50 条
  • [31] Cloud computing platform: Performance analysis of prominent cryptographic algorithms
    Ajmal, Abdullah
    Ibrar, Sundas
    Amin, Rashid
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15):
  • [32] Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
    Kaaniche, Nesrine
    Laurent, Maryline
    COMPUTER COMMUNICATIONS, 2017, 111 : 120 - 141
  • [33] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [34] A Cryptographic Scheme for Secure Cloud Computing
    Llamas, Alejandro
    Ernesto Gonzalez, Raul
    2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2013, : 221 - 226
  • [35] Secure Resource Management in Cloud Computing: Challenges, Strategies and Meta-Analysis
    Saxena, Deepika
    Swain, Smruti Rekha
    Kumar, Jatinder
    Patni, Sakshi
    Gupta, Kishu
    Singh, Ashutosh Kumar
    Lindenstruth, Volker
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2025,
  • [36] Comprehensive Security Integrated Model and Ontology within Cloud Computing
    Liu, Fong-Hao
    Lo, Hsiang-Fu
    Chen, Liang-Chu
    Lee, Wei-Tsong
    JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (06): : 935 - 945
  • [37] A new cryptographic method for cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 58 - 65
  • [38] Cloud Computing security classifications and taxonomies: a comprehensive study and comparison
    Tissir, Najat
    El Kafhali, Said
    Aboutabit, Nourddine
    PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 264 - 269
  • [39] Comprehensive meta-analysis
    Pierce, Charles A.
    ORGANIZATIONAL RESEARCH METHODS, 2008, 11 (01) : 188 - 191
  • [40] Comparative Analysis on Security Mechanisms in Cloud
    Fakhar, Faiza
    Shibli, Muhammad Awais
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 45 - 50