Efficiency Of Encryption In Cloud Security

The problem and its setting

Cloud encryption is a service that is offered by the cloud storage providers in which the data or text shared across the cloud is converted into encrypted algorithm and successively placed on the cloud storage. Usually the encrypted data is ciphered and stored in the cloud systems and storage to prevent unauthorized access and potential hacking. Cloud customer learns regarding the procedures and policies for encryption as well as management of encryption key. However, the service provider cloud encryption capability need to be matching to the sensitivity of the data that has been hosted.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Encryption consumes more overhead processor through cloud providers offering the basic encryption on a field of database like account numbers and passwords. The provider encrypting customer database also becomes expensive that needs sense for storing the data in house for encryption of the data before sending the data into the cloud. For keeping low cost, some cloud providers’ offers alternative encryption that does not require processing power. The techniques includes obfuscating or redacting data that is needed for remaining confidential regarding the use of proprietary encryption algorithm that has been created by the vendor. Moreover, the businesses also feel comfortable allowing cloud providers for management of encryption keys that has adequate security risks that can be managed through audits, controls and contracts. Cloud providers do not honors commitments during responses to government requests (Harris 2016).

Data protection effectively is possible through cloud solutions and is efficiently done through data encryption. Business regulations and information security helps corporate executives to face security as well as privacy challenges. Encryption is the technology that helps in storing the data on servers that resides on company having direct control. Business data that is hosted on cloud helps in having a direct control on the protection of assets, cloud provider selection. The research provides the opportunity for testing the efficiency of encryption through cloud security. A brief statement of the problem as well as its sub problems has been provided. The major research limitations are also provided with the assumptions that are made for the research. A brief review has been provided for the research as well to identify the gap of literature. The research methodology has been provided within the document as well that demonstrates the data required as well as the means for obtaining the data. A systematic description of solving the problem has been provided as well. Three research problems identified are discussed as well through analyzing the ethical considerations. An outline for the proposed study has been also evaluated in the current proposal.

The statement of the problem and its sub problems

The research proposal provides a brief outline of the research that will be conducted for investigating and analyzing the efficiency of encryption in Cloud Security. The research questions is:

How much efficient is encryption method in Cloud Security for protecting valuable system data?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The current research will provide a secondary research for gathering the knowledge on the different encryption techniques used for providing cloud security. The current research aims at investigating and analyzing the efficiency of encryption in Cloud Security.

The three sub problems into which the research has been classified are as follows:

  • Comparing the encryption methods in Cloud computing security
  • Analyzing the Cloud computing homorphic encryption
  • Assessing the impact of cloud encryption on cloud security

The research limitations are as follows:

  • The Cloud computing security methods is very much limited in terms of efficiency
  • The cloud computing security methods by encryption are not fully protective from all forms of security threats in the network

The assumptions of the research are as follows:

  • The cloud computing security methods encryption is highly efficient in tackling with lower level of hacking programs
  • The cloud computing security methods encryption is not efficient when the hacker has access to multiple access to credentials

Cloud security is normally the arrangements, control and advancements that is utilized for ensuring the applications and foundations of the distributed computing. Cloud security is generally the sub area of system security, PC security and data security that gives personality administration, work force security, physical security and protection to the distributed computing framework. The process of the research will break down and explore the cloud security and its proficiency. The question merits exploring as it gives a basic examination of the cloud security strategies and assess the proficiency of each cloud security techniques. Broad virtualization usage in the cloud foundation helps in giving the security concerns in regards to the clients of open cloud service. The extra virtualization layer includes aides in defending the shortcomings inside the framework decreasing impact of the assault.

Diverse cloud security design controls are available that are generally hindrance control, preventive control, criminologist control and restorative control. The exploration address additionally surveys the issues related in sending of the cloud security techniques and prescribe potential solution for alleviating the issues. The arrangement techniques will be contrasted with each other and the issue in the sending strategy will be investigated in the present assignment (Li 2015). The inquiries that have been chosen are possible as it aides in including optional sources that is investigating the auxiliary sources, for example, databases, diaries and articles. The data will be gathered with respect to the cloud security frameworks and their organization strategies. The organization strategies will be contrasted with each other and the issue in the sending technique will be broken down. Thus the examination question can be addressed effectively with satisfactory possibility and in addition clearness that make the exploration quantifiable. Along these lines the researcher can lead the examination with high precision and get an attractive outcome after execution of the investigation.

The limitations

Encryption is a productive strategy for securing the information in cloud frameworks through crypto-destroying systems. According to Zheng (2013), the trait based encryption calculation is Cipher content approach aides in giving the difficult procedure and outline of the structure that can be effectively dissected utilizing the exploration address. Cloud suppliers fuse business coherence as well as information recuperation arrangements that guarantee the administrations are kept up amid the calamity and crisis circumstance that helps in recouping the information that has been deleted. Dominant part of the information gathered will be protected as the question does not cause any issue with a great part of the individual information advancement. The importance of the research incorporates investigate the cloud security strategies as well as evaluating the usage and sending techniques testing results of productivity and viability. Satisfactory moral contemplations will be remembered, for example, information security act as well as the research information that will be utilized for business purpose. Information gathered will be appropriately referenced and also the new information will be made by determinations from the investigation of the gathered information.

Four levels of frameworks viably and basically giving an ID of the outline topologies will be chosen. It gives a standard way to deal with the site framework usefulness that addresses the standard of benchmarking within cloud computing. The likelihood of level 5 in server farms helps in assessment of the effectiveness of each level that is available for server distribution. It evaluates the issues related in institutionalizing the level 5 in server farms lastly prescribing the potential answer for relief of the issues (Chen 2015). The four frameworks that give powerful and straightforward distinguishing of server farms incorporate process for the plan of foundation. Level characterization framework in distributed through computing that is normally the business standard aides in moving towards the site usefulness and in addition benchmarking the necessities of the standard. The four levels in server farms are level 1, level 2, level 3 and level 4 individually (Wu 2014). The inquiries that have been chosen are achievable as it aides in including auxiliary sources that will help in removing data from the optional sources, for example, diaries, database and articles. The information will be gathered as far as probability of level 5 in server farms by breaking down the four distinctive existing levels. The examination address has been kept basic as feasible for encouraging the researchers in playing out the exploration. The likelihood of level 5 in server farm will guarantee the legitimate augmentation of physical server farms.

The assumptions

The single physical site introduction and accessibility idea should be surveyed as well. Conceptually the level 5 server farms rises above the single physical site and in addition gives excess assets of registering situated at least two locales within the cloud network that are accessible and tries to convey to consistent server farms individually. Level 1 is made out of a solitary way that helps in conveyance and cooling without the segments, which are excess, and gives roughly 99.671% of accessibility. It ordinarily comprises of non-excess parts limit, for example, the servers and single uplinks. The level 2 incorporates the offices given by level 1 extra repetitive limit components. The level 3 comprises of offices given by both level 1 and level 2 alongside the double controlled types of gear and also various uplinks. At last, level 4 comprises of all offices from level 1, 2 and 3 with extra completely blame tolerant including stockpiling, uplinks, chillers, HVAC frameworks and servers (Wan 2015).

The levels in server farms are utilized for measuring the execution of server farms, the speculations and rate on venture as well. It is typically a standard utilized for estimation of the uptime for the server farm. To great degree expansive informational collections that are broken down for uncovering the examples, patterns and affiliations prompting the human conduct and associations are called Big Data. The vast measure of information that is put away in the cloud is known to as large information and is another and imaginative innovation that is utilized for putting away the huge informational collection and thus no restriction in physical stockpiling is confronted in the cloud. The security distributed storage information situation component framework is used to speak to and control where datasets is utilized for capacity reason. This part can be used to maintain techniques in which each dataset be secured and perform visit checks and additionally audit of each dataset’s stockpiling region for ensuring the best possible dispersed stockpiling gadgets that is used by requirements developed in the organization contract. As per Parashar (2013), the question merits researching as it gives a basic investigation on the focal points security mindful information arrangement component for

Big Data Cloud Storage assessing the productivity of instrument as an additional to surveys. The issues related in security information position system and its usage alongside the suggestion for the potential answer for moderate issues is also discussed. The question is essential as less research has been led in the area of the points of interest that includes security information position instrument for Big Data Cloud Storage. The questions that have been chosen are multi variable as it aides in including optional sources and also embracing a deductive approach. Deductive approach will be chosen for the research in which the examination will be begin from an immense summed up point and will be diminished to a more particular theme of cloud computing. Inductive approach is maintained by a strategic distance as it doesn’t enable the researcher to get a legitimate conclusion. Advanced inductive approach is not acceptable as it begins the exploration from a particular approach and finishes up the examination on a summed up approach. Sufficient moral contemplations have been received remembering the pertinence of the exploration address through gathering the information in a moral way (Dai 2015).

The review of the related literature

Big data examination is a basic contraption, which engages associations to inspect all data relating to their customers and the market part in which they work. As this data contains a wealth of information concerns the brand, things, customer advantage satisfaction and customer feeling, numerous associations have received the use of tremendous data investigation. The purpose of the question is clear and is effectively quantifiable as it gives the researcher the chance to investigate the optional hotspots for information with respect to the security mindful information arrangement instrument for Big Data Cloud Storage lastly help in arriving the conclusion after information has been broken down. It has been contended that the security information arrangement component for Big Data Cloud Storage incorporates examination of the client information and in addition corporate information that helps in centering stockpiles of the information in Big Data distributed storage with sufficient security ensuring the powerless information is not hacked or stolen easily. Big information received by organizations helps in taking better choices in the business region and in addition have an upper hand over other advanced sources. The availability of the information likewise turns into an issue because of comprehensive nature of the huge information. Advertising information particularly the email promoting, CRM, versatile investigation and social examination turns out to be anything but difficult to center because of the dependability of the enormous information. Such trust is picked up by security information situation instrument for Big Data Cloud Storage and in addition its assurance against hacking and unapproved access too. Standard sorts of administering tremendous volumes of data can be exorbitant. Big data examination unravels this methodology by performing impelled data taking care of and examination at high speeds. This makes the technique more flexible and versatile for customers and also hazard inclined. Big data instruments empower individual to analyze the threats that is confronted by the association.

Adequate secondary research will be carried out for performing the research. A deductive approach will be selected and secondary quantitative and qualitative data will be considered for the research. According to Kerschbaum (2014), the cloud computing efficiencies will be taken into considerations especially in the domain of the encryption systems that need to be followed and maintained. The encryption systems will be compared to each other and finally the homomorphic encryption system will be compared and analyzed using relevant literature from various databases. Adequate ethical considerations will be kept in mind that provides the opportunity for the research to be conducted very efficiently. The data collected will not be used for personal or commercial use. It will be solely responsible for the protection of the privacy of other secondary data and will be cited properly.

Cloud encryption is a service that is offered by the cloud storage providers in which the data or text shared across the cloud is converted into encrypted algorithm and successively placed on the cloud storage. The techniques includes obfuscating or redacting data that is needed for remaining confidential regarding the use of proprietary encryption algorithm that has been created by the vendor. The research provides the opportunity for testing the efficiency of encryption through cloud security. A brief statement of the problem as well as its sub problems has been provided. A systematic description of solving the problem has been provided as well. Three research problems identified are discussed as well through analyzing the ethical considerations. An outline for the proposed study has been also evaluated in the current proposal. The research proposal provides a brief outline of the research that will be conducted for investigating and analyzing the efficiency of encryption in Cloud Security. The three sub problems into which the research has been classified. The process of the research will break down and explore the cloud security and its proficiency. The question merits exploring as it gives a basic examination of the cloud security strategies and assess the proficiency of each cloud security techniques. Broad virtualization usage in the cloud foundation helps in giving the security concerns in regards to the clients of open cloud service. Along these lines the researcher can lead the examination with high precision and get an attractive outcome after execution of the investigation. The importance of the research incorporates investigate the cloud security strategies as well as evaluating the usage and sending techniques testing results of productivity and viability. Level characterization framework in distributed through computing that is normally the business standard aides in moving towards the site usefulness and in addition benchmarking the necessities of the standard. The four levels in server farms are level 1, level 2, level 3 and level 4 individually. Deductive approach will be chosen for the research in which the examination will be begin from an immense summed up point and will be diminished to a more particular theme of cloud computing.

References

Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), pp.1922-1926.

Harris, T. and Edington, S., Visa International Service Association, 2016. Cloud Encryption Key Broker Apparatuses, Methods and Systems. U.S. Patent Application 15/045,435.

Jadhav, S.P. and Nandwalkar, B.R., 2015. Efficient cloud computing with secure data storage using AES. International Journal of Advanced Research in Computer and Communication Engineering, 4(6), pp.377-81.

Jung, T., Li, X.Y., Wan, Z. and Wan, M., 2015. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Transactions on Information Forensics and Security, 10(1), pp.190-199.

Kerschbaum, F., 2014, November. Client-controlled cloud encryption. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 1542-1543). ACM.

Li, H., Liu, D., Dai, Y. and Luan, T.H., 2015. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. IEEE Wireless Communications, 22(4), pp.74-80.

Li, J., Li, J., Chen, X., Jia, C. and Lou, W., 2015. Identity-based encryption with outsourced revocation in cloud computing. Ieee Transactions on computers, 64(2), pp.425-437.

Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), pp.131-143.

Li, X., Li, W. and Shi, D., 2015. Enterprise private cloud file encryption system based on tripartite secret key protocol. In International industrial informatics and computer engineering conference (pp. 166-169).

Liu, Q., Wang, G. and Wu, J., 2014. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information Sciences, 258, pp.355-370.