This website uses cookies to ensure you have the best experience. Learn more

Using Data Encryption For Security In Cloud Computing

2098 words - 8 pages

Cloud computing is expanding and replacing traditional storage and computing methods. It provides many advantages including greater access and it is cheaper than the traditional onsite server. Cloud computing provides an efficient and economical opportunity for many businesses and individuals to store files and information at an offsite data center. By providing access to these offsite data centers, businesses and individuals are able to remotely access their information from many different locations and they are saving money not having to invest in the servers. Security and privacy issues are a concern within cloud computing. The introduction of cloud computing has presented some security challenges that many consumers may question. There are a number of possible security issues or risks pertaining to how the data is stored and secured within cloud computing. This research paper will analyze cloud computing and the issues it faces from a security standpoint. The main focus for this paper will be on how data encryption can help safeguard information being stored in the cloud. Data encryption is a key component in security for cloud computing and is often used when secure information is being transmitted.
Keywords: cloud, security, data encryption

Using Data Encryption for Security in Cloud Computing
Today, businesses and individuals want the ability to access their data anytime and anywhere. As technology advances and the newest devices such as smartphones, tablets, and laptops are released, this ability has increased. The introduction of cloud computing provides the ability for individuals to be able to access their information from various locations and at various times. Cloud computing has numerous advantages including: money savings, easy to use, helps organization, saves time, and it is safe. Cloud computing provides safety from risks of fire, flood damage, or burglary. However, concerns over the security of the data in cloud computing is often questioned. Today, organizations and individuals must be able to safeguard their data. Thieves such as hackers and identity thefts are constantly enhancing their practices in an effort to capture information. This paper is going to look at cloud computing, the need for security in cloud computing, and how data is protected in the cloud. It will provide information on some of the perceived risks and why security is important. As a point of focus, this paper will analyze data encryption and how it helps provide security when information is transmitted to the cloud.
Cloud computing provides a convenient network for multiple devices to be able to share information or files and retrieve them on-demand. With minimal management effort for the service provider, cloud computing provides on-demand access to computing resources such as servers, storage, network, and applications (Maheta 2012). Cloud computing is delivering application as services over the internet using the...

Find Another Essay On Using Data Encryption for Security in Cloud Computing

Cloud Security Computing Essay

1737 words - 7 pages . Consequently, the major user concerns regarding cloud computing include its security. Some of the security concerns in cloud computing include data magnetization or remanence, data provenance, data lineage, data multitenancy, data processing, data-at-rest, and data-in-transit. Data-in-transit must undergo the encryption process to maintain confidentiality while data-at-rest can be compromised if it is not deciphered (Rittinghouse and Ransome

Analysis of Cloud Computing Security

1549 words - 7 pages good number of benefits for its clients however it raises some security problems which may slow down its slow. Understanding what liability exist in cloud computing will help the organization to make the shift towards the cloud. Traditional data hosting, web applications and virtualization have been looked over, but some of solutions are offered are immature. Multiple clients can share a physical server by using virtualization is one of the major

Adoption of Cloud Computing relating to Data Storage

2267 words - 9 pages The main driving forces of cloud data storage are reputable companies such as Amazon and Google building comprehensive computing infrastructures (Google, 2009). These infrastructures are removing the complexity of in-house data storage and ultimately reducing costs of limited networked data centres (Hitachi, 2010). The traditional inefficient model of purchasing servers every time you need to accommodate for high use or growth is now being

The Advantages and Disadvantages of using Cloud computing Service

830 words - 3 pages The Advantages and Disadvantages of using Cloud computing ServiceThe "cloud" refers to the Internet; it is usually hosted on more then one server in multiple locations, normally neither the public nor the businesses know where the information is located. Many consumers are turning to the cloud to store and retrieve their data from any computer in the world. They are using this service to store their software, conduct, documents, other personal

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

Cloud Computing in Libraries

1595 words - 7 pages definition for cloud computing can be given as an emerging computer paradigm where data and services reside in massively scalable data centers in the cloud and can be accessed from any connected devices over the internet. In other word, it is the practice of using a network of remote servers hosted on the internet to store, manage and process data rather than a local server or a personal computer. Cloud computing is a way of providing various

Cloud Computing in Healthcare

866 words - 4 pages records being breached can be even more damaging because the healthcare cloud security protects sensitive patient information. Further, the deletion of some of the files can be detrimental because the files are often very critical as they contain medical data that in many cases can be the difference between life and death (Bahga 21). For example, two security breaches that occurred at Oregon health and Science University recently led to over

Cloud Computing in Small Organization

1918 words - 8 pages data protection is the Data Protection Act from year 1998. It covers how business should store and use data. This piece of legislation applies on any business that uses and operates with any personal information about living individuals. When using cloud computing data can be stored anywhere but our business is responsible for that data. Summary Last few years of development in IT services has brought us great technologies how to deal with IT

Security in The Cloud

1724 words - 7 pages . What companies need to do is implement stronger encryption setting that asks the user for more then just the password and username to open access to files. For instance, companies can encrypt data in zip files that ask a specific password that only the user knows and not the organization that holding the data on the cloud. Last but not least, Application security needs strong security measures. Since data is being accessed by many devices it

Cloud Computing Slutions for Electrical Measuring Systems

538 words - 3 pages generated data on local storage or sending it using various network infrastructures to the processing unit or controlling stations. Cloud Computing solutions for electrical measuring systems In case of providing generated data for remote processing systems, most of measuring devices are still deploying modem access and serial bus technology to communicate with their monitoring platforms. Traditionally, measuring devices read sensor and auxiliary

Similar Essays

Ensuring Data Security Using Homomorphic Encryption In Cloud Computing

1302 words - 5 pages providing results of calculations on encrypted data without knowing the raw data on which the calculation was carried out, with respect of the data confidentiality. some important security services including authentication, encryption and decryption are provided in Cloud Computing system. REFERENCES: [1] Vic (J.R.) Winkler, “Securing the Cloud, Cloud Computer Security, Techniques and Tactics”, Elsevier, 2011. [2] Pascal Paillier. Public

Access Control And Data Updation With At Pre: Attribute Time Based Proxy Re Encryption For Shared Data In Cloud

2111 words - 9 pages his username and password. Fig 3 Architecture of AT-PRE scheme. 1.1 Upload: For secure data sharing, the owner encrypts the file before uploading it to cloud. As Encryption is the standard method for making a communication private. Before doing so, the owner defines an access structure for the file. For ex: access structure {(Faculty or Student) and (CS or IS)} After defining an access structure, encrypts the file using RSA algorithm that is

Cloud Computing Security Essay

1573 words - 6 pages private data through encryption. Powerful encryption and flexible key management Vormetric offered for Amazon ensures that both structured and unstructured data in Amazon cloud is secure (Vormetric, 2011). As such, clients using Amazon cloud computing can confidently store and search for files and database in the cloud. Establishment and maintenance of physical security at data storage centers is also important to ensure that data stored in the

Security: Cloud Computing Essay

1554 words - 6 pages : 1) Using single cloud service provider. 2) Using multiple cloud service providers. The drawback of single cloud service provider is that it can be easily hacked by any attacker. In multiple cloud service provider model gives better security and availability of user private data. Fig 1: Cloud Computing Architecture Example Data integrity and privacy of the data are the most critical issues in cloud storage. For that reason