Use of Cryptography in Cloud Computing

Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. Howeve...

Full description

Saved in:
Bibliographic Details
Main Authors: Jaber, Aws Naser, Mohamad Fadli, Zolkipli
Format: Conference or Workshop Item
Language:English
Published: IEEE 2013
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/5958/4/fskkp-2013-jaber-Use%20of%20Cryptography%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/5958/
https://doi.org/10.1109/ICCSCE.2013.6719955
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.5958
record_format eprints
spelling my.ump.umpir.59582018-08-07T02:42:42Z http://umpir.ump.edu.my/id/eprint/5958/ Use of Cryptography in Cloud Computing Jaber, Aws Naser Mohamad Fadli, Zolkipli QA Mathematics Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system. IEEE 2013 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/5958/4/fskkp-2013-jaber-Use%20of%20Cryptography%20in%20Cloud%20Computing.pdf Jaber, Aws Naser and Mohamad Fadli, Zolkipli (2013) Use of Cryptography in Cloud Computing. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2013), 29 Nov - 1 Dis 2013 , Mindeb, Malaysia. pp. 179-184.. ISBN 978-1-4799-1508-8 https://doi.org/10.1109/ICCSCE.2013.6719955
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA Mathematics
spellingShingle QA Mathematics
Jaber, Aws Naser
Mohamad Fadli, Zolkipli
Use of Cryptography in Cloud Computing
description Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system.
format Conference or Workshop Item
author Jaber, Aws Naser
Mohamad Fadli, Zolkipli
author_facet Jaber, Aws Naser
Mohamad Fadli, Zolkipli
author_sort Jaber, Aws Naser
title Use of Cryptography in Cloud Computing
title_short Use of Cryptography in Cloud Computing
title_full Use of Cryptography in Cloud Computing
title_fullStr Use of Cryptography in Cloud Computing
title_full_unstemmed Use of Cryptography in Cloud Computing
title_sort use of cryptography in cloud computing
publisher IEEE
publishDate 2013
url http://umpir.ump.edu.my/id/eprint/5958/4/fskkp-2013-jaber-Use%20of%20Cryptography%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/5958/
https://doi.org/10.1109/ICCSCE.2013.6719955
_version_ 1643665279851429888
score 13.209306