Use of Cryptography in Cloud Computing

Jaber, Aws Naser and Mohamad Fadli, Zolkipli (2013) Use of Cryptography in Cloud Computing. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2013), 29 Nov - 1 Dis 2013 , Mindeb, Malaysia. pp. 179-184.. ISBN 978-1-4799-1508-8

fskkp-2013-jaber-Use of Cryptography in Cloud Computing.pdf

Download (681kB) | Preview


Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system.

Item Type: Conference or Workshop Item (Lecture)
Uncontrolled Keywords: Cloud encryption; cryptographic algorithms; cloud security infrastructure
Subjects: Q Science > QA Mathematics
Faculty/Division: Faculty of Computer System And Software Engineering
Depositing User: Mrs. Neng Sury Sulaiman
Date Deposited: 23 Jun 2014 07:25
Last Modified: 07 Aug 2018 02:42
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item