Use of Cryptography in Cloud Computing

Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. Howeve...

Full description

Bibliographic Details
Main Authors: Jaber, Aws Naser, Mohamad Fadli, Zolkipli
Format: Conference or Workshop Item
Language:English
Published: IEEE 2013
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/5958/
http://umpir.ump.edu.my/id/eprint/5958/
http://umpir.ump.edu.my/id/eprint/5958/4/fskkp-2013-jaber-Use%20of%20Cryptography%20in%20Cloud%20Computing.pdf
id ump-5958
recordtype eprints
spelling ump-59582018-08-07T02:42:42Z http://umpir.ump.edu.my/id/eprint/5958/ Use of Cryptography in Cloud Computing Jaber, Aws Naser Mohamad Fadli, Zolkipli QA Mathematics Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system. IEEE 2013 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/5958/4/fskkp-2013-jaber-Use%20of%20Cryptography%20in%20Cloud%20Computing.pdf Jaber, Aws Naser and Mohamad Fadli, Zolkipli (2013) Use of Cryptography in Cloud Computing. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2013), 29 Nov - 1 Dis 2013 , Mindeb, Malaysia. pp. 179-184.. ISBN 978-1-4799-1508-8 https://doi.org/10.1109/ICCSCE.2013.6719955
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
topic QA Mathematics
spellingShingle QA Mathematics
Jaber, Aws Naser
Mohamad Fadli, Zolkipli
Use of Cryptography in Cloud Computing
description Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system.
format Conference or Workshop Item
author Jaber, Aws Naser
Mohamad Fadli, Zolkipli
author_facet Jaber, Aws Naser
Mohamad Fadli, Zolkipli
author_sort Jaber, Aws Naser
title Use of Cryptography in Cloud Computing
title_short Use of Cryptography in Cloud Computing
title_full Use of Cryptography in Cloud Computing
title_fullStr Use of Cryptography in Cloud Computing
title_full_unstemmed Use of Cryptography in Cloud Computing
title_sort use of cryptography in cloud computing
publisher IEEE
publishDate 2013
url http://umpir.ump.edu.my/id/eprint/5958/
http://umpir.ump.edu.my/id/eprint/5958/
http://umpir.ump.edu.my/id/eprint/5958/4/fskkp-2013-jaber-Use%20of%20Cryptography%20in%20Cloud%20Computing.pdf
first_indexed 2023-09-18T22:01:25Z
last_indexed 2023-09-18T22:01:25Z
_version_ 1777414423865982976