Security enhancement in Cloud Computing
Keywords:
Cloud Server, Encryption, Deployment ModelAbstract
Cloud computing makes it possible to use Internet-based apps as utilities. It gives us the ability to design, configure, and personalise our apps in real time through the internet. Using cloud computing, customers may store and execute programmes on a virtual computer infrastructure. Because cloud service providers may access and modify client data without their knowledge or consent, there are additional security risks associated with using the service. We're working to balance security, efficiency, and usability while developing cryptographic primitives and protocols for the cloud. Using cryptography, data may be encoded such that only the intended recipients can access it and process it.
References
Amazon. (2011). Amazon Web Services: Overview of Security Processes. Retrieved from
http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf
Arora, P., Biyani, R. and Dave, S. (2011). To the cloud:Cloud powering an enterprise. McGraw-Hill. Buck, K. and Hanf, D. (2009).
Mitre cloud computing series, Cloud SLA considerations for the government consumer. Retrieved from
http://www.mitre.org/work/tech_papers/2010/10_2902/cloud_sla_considerations_government.pdf
Introduction to Cryptography
http://en.wikipedia.org/wiki/Cryptography
Traditional Cloud server security
http://cloudsecuritythreats.blogspot.in/2011/11/traditional-security.html
Fundamentals of Cryptography: Algorithm and Security Services by Professor Guevara Noubir
http://www.ccs.neu.edu/home/noubir/Courses/CSU610/S06/cryptography.pdf
Logik Bomb: Hacker's Encyclopedia (1997)
Hafner, Katie; Markoff, John (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster. ISBN 0-671-68322-5.
Sterling, Bruce (1992). The Hacker Crackdown. Bantam. ISBN 0-553-08058-X.
Slatalla, Michelle; Joshua Quittner (1995). Masters of Deception: The Gang That Ruled Cyberspace. HarperCollins. ISBN 0-06-017030-1.
Dreyfus, Suelette (1997). Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier. Mandarin. ISBN 1-86330-595-5.
Verton, Dan (2002). The Hacker Diaries : Confessions of Teenage Hackers. McGraw-Hill Osborne Media. ISBN 0-07-222364-2.
Thomas, Douglas (2002). Hacker Culture. University of Minnesota Press. ISBN 0-8166-3345-2.
Taylor, Paul A. (1999). Hackers: Crime in the Digital Sublime. Routledge. ISBN 978-0-415-18072-6.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.