blog




  • Essay / Using Data Encryption for Security in Cloud Computing

    Cloud computing expands and replaces traditional storage and computing methods. It offers many benefits including better access and is less expensive than traditional on-premises server. Cloud computing provides many businesses and individuals with an efficient and cost-effective opportunity to store files and information in an off-site data center. By providing access to these off-site data centers, businesses and individuals can remotely access their information from many different locations and save money without having to invest in servers. Security and privacy issues are a concern in cloud computing. The introduction of cloud computing has posed some security concerns that many consumers might wonder about. There are a number of possible security issues or risks related to how data is stored and secured in cloud computing. This research paper will analyze cloud computing and the issues it faces from a security perspective. This article will primarily focus on how data encryption can help protect information stored in the cloud. Data encryption is a key part of cloud computing security and is often used when transmitting secure information. Keywords: cloud, security, data encryption Using Data Encryption for Security in Cloud Computing Today, businesses and individuals want to be able to access their data anytime and anywhere. As technology advances and newer devices such as smartphones, tablets, and laptops are released, this capacity has increased. The introduction of cloud computing allows individuals to access their information from different locations and at different times. Cloud computing has many advantages...... middle of paper ......kanth. (2013). Security issues on cloud computing. International Journal of Computer Science and Information Security, 11(8), 25-34. Retrieved from http://search.proquest.com/docview/1467725412?accountid=12085Singla, S. and Singh, J. (2013). Cloud data security using authentication and encryption technique. Global Journal of Computer and Technology, 13(3-), 31-35. Retrieved from http://search.proquest.com/docview/1460981525?accountid=12085Stallings, W. (2002). The advanced encryption standard. Cryptologia, 26(3), 165. Retrieved from http://search.proquest.com/docview/213058590?accountid=12085Thomas, G., Jose, P., V., and Afsar, P. (2013). Cloud computing security using encryption technique. International Journal of Advanced Studies in Computer Science and Engineering, 2(5), 14-18. Retrieved from http://search.proquest.com/docview/1505018544?accountid=12085