A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

被引:0
|
作者
Mehmet Sabır Kiraz
机构
[1] Mathematical and Computational Sciences Labs TÜBİTAK BİLGEM,
关键词
Cloud computing; Security; Privacy; Cryptographic algorithms and protocols;
D O I
暂无
中图分类号
学科分类号
摘要
The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.
引用
收藏
页码:731 / 760
页数:29
相关论文
共 50 条
  • [41] Cloud Computing Privacy & Security Global Issues, Challenges, & Mechanisms
    Lar, Saleem-ullah
    Liao, Xiaofeng
    Abbas, Syed Ali
    2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1240 - 1245
  • [42] Cyber security threats, challenges and defence mechanisms in cloud computing
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    IET COMMUNICATIONS, 2020, 14 (07) : 1185 - 1191
  • [43] Safeguarding Cloud Computing Infrastructure: A Security Analysis
    Alenezi, Mamdouh
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (02): : 159 - 167
  • [44] Analysis of SDN contributions for Cloud Computing Security
    de Jesus, Wanderson Paim
    da Silva, Daniel Alves
    de Sousa Junior, Rafael T.
    Lopes da Frota, Francisco Vitor
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 922 - 927
  • [45] An Analysis of Security Related Issues in Cloud Computing
    Babu, L. D. Dhinesh
    Krishna, P. Venkata
    Zayan, A. Mohammed
    Panda, Vijayant
    CONTEMPORARY COMPUTING, 2011, 168 : 180 - +
  • [46] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)
  • [47] Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
    Rahul, B.
    Kuppusamy, K.
    IETE JOURNAL OF RESEARCH, 2023, 69 (09) : 6053 - 6064
  • [48] In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security
    Khan, Najeeb Ahmad
    Panchal, V. K.
    Tanweer, Safdar
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 27 - 41
  • [49] A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing
    Jangjou, Mehrdad
    Sohrabi, Mohammad Karim
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (06) : 3587 - 3608
  • [50] Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
    Ali, Tarek
    Al-Khalidi, Mohammed
    Al-Zaidi, Rabab
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,