Professional Documents
Culture Documents
net/publication/274780011
CITATIONS READS
0 750
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
performance enhacement of internet gateway in ad hoc networks by using clustering schemes View project
All content following this page was uploaded by Mufind Mukaz Ebedon on 11 April 2015.
Abstract I. INTRODUCTION
Security is an important factor in cloud computing to Several trends now days are opening up to the
ensure that the client data is placed in a secure place. era of cloud computing, which is, the use of internet
Cloud computing help business to improves their and computer resources, cloud can provide a cheaper
organization by using the services the cloud provider resources such as CPU, HDD, cheaper data center
offer such as shared network, valuable resources rather than buying your own resources and building
bandwidth, software and hardware in a cost effective your own data center, cloud is offering services
manner. In this research paper, we are focusing on combine with the platform and the infrastructure that
what encryption a client need before choosing a allow you to use a software without carrying more on
cloud provider, because good encryption will help what infrastructure to use or what platform to install.
you protect your data when you share it or use it, but There are a lot of advantages of cloud but one
if it is not consider before, the client will hand up of the biggest concerns with data storage in cloud are
losing data, paying more money to cloud provider, data confidentiality, user and company are worry
because the encryption offering by the cloud doesn’t about what to do to secure their data and what
much with his need. We are going to compare two encryption to use just to make their data confidential
encryption; asymmetric (DES and AES) and because their data are not control by them, they live it
symmetric (RSA) algorithms. We have found that the to a provider to secure it for them, so the importance
encryption needed will depend on the confidentiality of knowing the best encryption it is very crucial to
of your data, if the data confidentiality is high you make sure every data are protected.
will need a strong encryption such as RSA, if not you
will need DES as encryption, so analyzing your data Our research will focus on encryption such as
confidentiality is very important before deciding on symmetric and asymmetric, It will be better for a new
which encryption to take. customer or company who wants to explore the
benefit of cloud, to know what encryption to use for
General Terms his data, so before deciding on which cloud provider
Security to choose it will be better to know the encryption
needed for your data then compare to what cloud
Keywords provider offer, we know that all the data are not
confidential so the client or company have to know
Cloud computing, Encryption, Data security, which encryption to use for each types of data
confidentiality
I.1. Related work II. BASICS
Data security in cloud has been a main point of
researcher, but talking about the all issue of data 1. Cloud computing
security will not solve the problem, that way most of
the researcher focus on a particular point or Cloud computing can be define as a
weaknesses of data security in cloud. distributed architecture system featuring virtualized
Some are focusing on creating a better encryption to and dynamically scalable resources, e.g, storage,
ensure that the share network are secure when we platforms, computer power and services which are
send a file, but their finding are not the same some delivered on demand to customer via internet. The
use asymmetric algorithm [1] some combine both cloud provides services what we called “everything as
asymmetric and symmetric [2] [3] algorithm to come
a service” model. Like we said in the last paragraph
with a better encryption.
other researcher focus on creating a third party audit we have a lot of services cloud offer but the most
[4] [5] to analyze if the cloud provider has a good used or popular are software as a service(Saas)
security, to ensure their client that their data are well provide software that runs over a platform and
secure, other focus on creating a scheme [6] [7] and infrastructure that is manage by the company offering
the rest are focusing in particular topic such as remote the services, e.g. sales forces, infrastructure as a
data integrity [8] [9]. service(Iaas)provides an infrastructure to client such
We can see that most of the researcher focus on
creating a new encryption or using a third party to as storage, hardware and others computer services
investigate on behave of the client and other focus on and finally platform as a services (Paas) provides a
creating scheme to make sure that the cloud has a platform ready for use and allow user to develop their
good design and security at the high level, but no one own application via this platform [10].
has focus on how a new company or client will We have three major cloud deployment
choose a particular encryption for it file before model such as Public clouds which allow customer to
moving to cloud because all the data doesn't have
pay to access their services, via internet, web
the some value so a different encryption will be
needed for each data, after choosing you can application or application programming interface
determine which cloud provider has that encryption (API) on the other hand we have Private clouds, it
and by doing that you will save the cost because you offer services to a limited number of clients by
can use a combination of private cloud and public restricting the rest to access that means it is working
cloud depending of your data value. Our research is as a company services. The last one is a hybrid cloud
focusing on analyzing some encryption and give which combine those two for example we have a
advice on what encryption to choose before moving
public storage combine with a companywide storage.
to cloud
There are a lot of clouds computing provider
Our work will be only focus on asymmetric and base on those services we talk earlier, but the most
symmetric cryptography, analyze them and decide known are: Amazon, Microsoft and Google
which one will be better for the client base on his
need and also enhanced them if needed.
2. Data security