Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Vikas Kumar
DOI Link: https://doi.org/10.22214/ijraset.2024.63567
Certificate: View Certificate
Several administrations, including programming, gathering, and coordinating equipment assets, are included in Cloud Computing (CC) and made available to service users online. The advantages of Cloud Computing are flexibility, competence, and high unwavering quality. Numerous organizations are already exchanging data to the Cloud, and as a result, this data needs to be protected against unauthorized assaults, service rejection, and other threats. Information is deemed secure if classification, accessibility, and uprightness are all available. The challenges and problems related to Cloud Computing security are illustrated in this paper. Additionally, research on security protocols for Cloud-based settings is carried out.
I. INTRODUCTION
Cloud is simply a set of servers and data centers in a variety of regions, on-demand services are provided to the user with these data centers and servers via the internet. On the user's computer, the Cloud service is not assembled[1]. The user can and should register for these services to receive access to them. The main advantage of Cloud Computing is that it does not make it compulsory for the user to be physically available in the same place as other hardware devices. As shown in figure 1, the Cloud allows access and storage the data from any place, at any minute without any thought of storage space, hardware, or software. Each of the above services is provided at a low cost to subscribers[2]. The Clouds are broadly classified as Private, Public, and Hybrid Clouds.
A. Benefits of Cloud Computing
CC offers a number of benefits, some of which are[3][4][5]:
B. Limitations of Cloud Computing.
Some of the limitations of Clouds are[6]:
Typical dangers include:
II. LITERATURE REVIEW
Table 1. Summary of Literature Review
S. N |
Author |
Technique used |
Focus On |
1. |
Singh et al.[1] |
RSA, SHA1 |
Data security with a hybrid algorithm |
2. |
Bahanaswami et al.[15] |
ASIC |
Comparative review of hardware security algorithms |
3. |
Cordova et al.[16] |
RSA, AES, Blowfish |
Comparative analysis of the performance of selected security algorithms |
4. |
Bhandari et al.[17] |
Use of cryptography concepts |
Improve the anonymity of encrypted and encrypted data |
5 |
Islam and Riyas[18] |
Various cryptographic encryption algorithms |
Benefits and security challenges of Cloud Computing |
6 |
Abdullah[19] |
AES |
Compete for algorithms like –DES, 3DES, Blowfish |
7 |
Khan and Tuteja[20] |
Security issues |
Strengthen Cloud Security |
8 |
Mushtak et al.[21] |
DES, AES, HiSea |
Use of appropriate encryption algorithm |
9 |
Kaur and Kinger[22] |
DES , 3DES , AES , RSA , IDES |
Covered various symmetric and asymmetric algorithms |
10 |
Bhardwaj et al. [23] |
Symmetric and Asymmetric algorithm |
Focus on symmetric algorithm |
11
|
Semwal and Sharma[24] |
Revolution of IT by Cloud Computing |
Implementation of security for Cloud Computing |
12 |
Abdul Salam and Hedabou [25] |
STRIDE |
Highlighted the security risks associated with the user |
13 |
Farsi et al.[26] |
Encryption |
Security threats and limitations of present cloud computing |
14 |
Zuliffqar et al. [27] |
Applications for CC |
Discussed applications for cloud computing |
15. |
Wang et al. [29] |
Sophisticated technologies |
Focus on data quality and privacy control |
16 |
Pansotra and Singh [30] |
Opposed RSA |
Focused on the improvement of an algorithm |
17 |
Alemami et al. [31] |
Encryption |
Summary of methodologies |
18 |
Tyagi et al.[32] |
Analysis of encryption algorithms |
More reliable keys will be searched |
19 |
Maddineni and Ragi [33] |
RSL and Survey |
Identification of various obstacles |
III. SECURITY
The practices, tools, and personnel used to protect a company's digital assets are referred to as information technology (IT) security [7]. Unauthorized users, sometimes referred to as threat actors, are prevented from stealing, utilizing, or disrupting these assets, devices, and services by IT security. These risks could be internal or external, and they could have a purposeful or inadvertent origin and character. The crucial components of security include:
IV. CLOUD SECURITY
Cloud security is a method of cyber security provided for securing Cloud Computing systems[8]. It involves keeping data safe and providing it security on online platforms. Cloud security which is also termed Cloud Computing security is a combination of security measures that are framed to protect infrastructure, data, and applications based on the Cloud. These standards guarantee user and device assertion, access control of resources and data, and also protection of privacy[9]. Some of the top security benefits of Cloud Computing:
V. CLOUD CRYPTOGRAPHY
A collection of methods known as Cloud cryptography is used to protect data that is handled and stored in Cloud Computing environments. By utilizing encryption and secure key management methods, it offers data privacy, integrity, and secrecy.
To safeguard that only the person for whom it is intended should read it and exchange data in contact, cryptography can be considered as a means of obscuring and storing classified info in a cryptic form. Using cryptography, authentication, and cautiously allocating keys, security algorithms and competitors strive to minimize cyber threats. Therefore, encoding is the science of protecting data and messages by transforming the user data that will be transmitted into a private, encrypted form and encrypting or scrambling the plaintext using the user data. The figure illustrates the cryptography process steps. 2.
A. Cryptography Algorithms
A mathematical procedure for transmitting data is described as an encryption algorithm. Information is encoded into cipher text using an algorithm and a key, and to change the data back into its original form, a "key" is needed.
For technology to enable effective and secure identification, as well as integrity and encryption, algorithms are a fundamental requirement. Cryptographic protocols and algorithms are used for fraud protection, restricting unauthorized access to public and private telecommunications networks, and safeguarding user data.
1) Algorithms for Public-Key Security[10][4][11]
a) Rivest Shamir Adleman (RSA): RSA is a cryptographic algorithm that involves the use of both a private key and a public key. Messages are encrypted using the publicly available key, while decryption of the encrypted messages can only be done using the corresponding private key. Figure 3 shows the Psesodocode of this algorithm.
The Cloud Computing model of viewership is helping push the IT industry into a long-awaited era. Nowadays, it is a utility, such as water, LPG, electricity, and wireless communications. The vital result of on-demand services is an attainable effect for many SMEs, which pretty much exclusively reduces overall infrastructure costs. Cloud Computing is still evolving, primarily in terms of security. Because history has repeatedly demonstrated that security should be prioritized. This paper indicates how Cloud security issues should be addressed by analyzing the literature. This review reveals a significant desire and momentum for the development of a safe Cloud and informational intentions for educational and commercial environments. As this field matures, solid supporting means to meet the rigid requirements of Cloud environments should be provided. Data encryption mechanisms are the most popular to maintain the CIA. In the future, a hybrid model will be proposed to enhance the security of Clouds.
[1] S. Singh and T. Nafis, “Cloud Computing: Security Issues,” Int. J. Comput. Intell. Res., vol. 13, pp. 1419–1429, 2017, doi: 10.7763/ijcce.2014.v3.332. [2] C. V. Raghavendran, G. N. Satish, P. S. Varma, and G. J. Moses, “A Study on Cloud Computing Services,” Int. J. Eng. Res. Technol., vol. 4, no. 34, pp. 1–7, 2017. [3] A. A. Abdulateef, A. H. Mohammed, and I. A. Abdulateef, “Cloud Computing Security for Algorithms,” 4th Int. Symp. Multidiscip. Stud. Innov. Technol. ISMSIT 2020 - Proc., 2020, doi: 10.1109/ISMSIT50672.2020.9254372. [4] Salesforce, “12 Benefits of Cloud Computing and Its Advantages - Salesforce.com,” Benefits Of Cloud Computing. 2022. [Online]. Available: https://www.salesforce.com/products/platform/best-practices/benefits-of-cloud-computing/ [5] F. Okeke, “Disadvantages of cloud computing,” Https://Www.Techrepublic.Com/Article/Disadvantages-Cloud-Computing/. 2022. [6] J. Van Der Ham, “Toward a Better Understanding of ‘Cybersecurity,’” Digital Threats: Research and Practice, vol. 2, no. 3. 2021. doi: 10.1145/3442445. [7] A. Jain and R. Kumar, “Confidentiality Enhanced Security Model for Cloud Environment,” Proc. Second Int. Conf. Inf. Commun. Technol. Compet. Strateg. - ICTCS ’16, pp. 1–6, 2016, doi: 10.1145/2905055.2905199. [8] S. Zhang, H. Yan, and X. Chen, “Research on Key Technologies of Cloud Computing,” Phys. Procedia, vol. 33, pp. 1791–1797, 2012, doi: 10.1016/j.phpro.2012.05.286. [9] A. Hamza and B. Kumar, “A Review Paper on DES, AES, RSA Encryption Standards,” Proc. 2020 9th Int. Conf. Syst. Model. Adv. Res. Trends, SMART 2020, pp. 333–338, 2020, doi: 10.1109/SMART50582.2020.9336800. [10] S. Kumar, B. K. Singh, Akshita, S. Pundir, S. Batra, and R. Joshi, “A survey on symmetric and asymmetric key based image encryption,” 2nd Int. Conf. Data, Eng. Appl. IDEA 2020, 2020, doi: 10.1109/IDEA49133.2020.9170703. [11] R. Abid et al., “An optimised homomorphic CRT-RSA algorithm for secure and efficient communication,” Personal and Ubiquitous Computing. 2021. doi: 10.1007/s00779-021-01607-3. [12] “How does Digital Signature Algorithm (DSA) work_ - The Security Buddy.” [13] M. A. Bahnasawi et al., “ASIC-oriented comparative review of hardware security algorithms for internet of things applications,” Proc. Int. Conf. Microelectron. ICM, vol. 0, pp. 285–288, 2016, doi: 10.1109/ICM.2016.7847871. [14] R. S. Cordova, R. L. R. Maata, A. S. Halibas, and R. Al-Azawi, “Comparative analysis on the performance of selected security algorithms in cloud computing,” 2017 Int. Conf. Electr. Comput. Technol. Appl. ICECTA 2017, vol. 2018–Janua, pp. 1–4, 2017, doi: 10.1109/ICECTA.2017.8252030. [15] A. Bhandari, A. Gupta, and D. Das, “Secure algorithm for cloud computing and its applications,” Proc. 2016 6th Int. Conf. - Cloud Syst. Big Data Eng. Conflu. 2016, pp. 188–192, 2016, doi: 10.1109/CONFLUENCE.2016.7508111. [16] N. K. V Islam and M. K. V Riyas, “International Journal of Computer Science and Mobile Computing Analysis of Various Encryption Algorithms in Cloud Computing,” Int. J. Comput. Sci. Mob. Comput., vol. 6, no. 7, pp. 90–97, 2017, [Online]. Available: www.ijcsmc.com [17] A. Muhammad Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data View project Call for papers View project Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt,” no. June, 2017, [Online]. Available: https://www.researchgate.net/publication/317615794 [18] S. S. Khan and P. . .R. Tuteja, “Security in Cloud Computing using Cryptographic Algorithms,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 3, no. 1, pp. 148–154, 2015, doi: 10.15680/ijircce.2015.0301035. [19] M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. A. Shakir, and M. M. Deris, “A Comprehensive Survey on the Cryptographic Encryption Algorithms,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, pp. 333–344, 2017. [20] G. S. Vennela, N. V. Varun, N. Neelima, L. S. Priya, and J. Yeswanth, “Performance Analysis of Cryptographic Algorithms for Cloud Security,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no. Icicct, pp. 273–279, 2018, doi: 10.1109/ICICCT.2018.8473148. [21] A. Bhardwaj, G. V. B. Subrahmanyam, V. Avasthi, and H. Sastry, “Security Algorithms for Cloud Computing,” Procedia Comput. Sci., vol. 85, no. Cms, pp. 535–542, 2016, doi: 10.1016/j.procs.2016.05.215. [22] P. Semwal and M. K. Sharma, “Comparative study of different cryptographic algorithms for data security in cloud computing,” Proc. - 2017 3rd Int. Conf. Adv. Comput. Commun. Autom. (Fall), ICACCA 2017, vol. 2018–Janua, pp. 1–7, 2018, doi: 10.1109/ICACCAF.2017.8344738. [23] Y. S. Abdulsalam and M. Hedabou, “Security and privacy in cloud computing: Technical review,” Futur. Internet, vol. 14, no. 1, 2022, doi: 10.3390/fi14010011. [24] M. Farsi, M. Ali, R. A. Shah, A. A. Wagan, and R. Kharabsheh, “Cloud computing and data security threats taxonomy: A review,” J. Intell. Fuzzy Syst., vol. 38, no. 3, pp. 2529–2537, 2020, doi: 10.3233/JIFS-179539. [25] I. Zulifqar, S. Anayat, and I. Kharal, “A Review of Data Security Challenges and their Solutions in Cloud Computing,” Int. J. Inf. Eng. Electron. Bus., vol. 13, no. 3, pp. 30–38, 2021, doi: 10.5815/ijieeb.2021.03.04. [26] A. Albugmi, M. O. Alassafi, R. Walters, and G. Wills, “Data security in cloud computing,” 5th Int. Conf. Futur. Gener. Commun. Technol. FGCT 2016, no. August, pp. 55–59, 2016, doi: 10.1109/FGCT.2016.7605062. [27] F. Wang, H. Wang, and L. Xue, “Research on Data Security in Big Data Cloud Computing Environment,” IEEE Adv. Inf. Technol. Electron. Autom. Control Conf., vol. 2021, pp. 1446–1450, 2021, doi: 10.1109/IAEAC50856.2021.9391025. [28] A. Pansotra and S. P. Singh, “Cloud security algorithms,” Int. J. Secur. its Appl., vol. 9, no. 10, pp. 353–360, 2015, doi: 10.14257/ijsia.2015.9.10.32. [29] Y. Alemami, A. M. Al-Ghonmein, K. G. Al-Moghrabi, and M. A. Mohamed, “Cloud data security and various cryptographic algorithms,” Int. J. Electr. Comput. Eng., vol. 13, no. 2, pp. 1867–1879, 2023, doi: 10.11591/ijece.v13i2.pp1867-1879. [30] K. Tyagi, S. K. Yadav, and M. Singh, “Cloud data security and various security algorithms,” J. Phys. Conf. Ser., vol. 1998, no. 1, 2021, doi: 10.1088/1742-6596/1998/1/012023. [31] V. S. K. MAddineni and S. Ragi, “Security Techniques for Protecting Data in Cloud,” 2011. doi: 10.35940/ijitee.a5043.129219. [32] J. Hassan et al., “The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges - A Systematic Literature Review (SLR),” Comput. Intell. Neurosci., vol. 2022, no. 5, 2022, doi: 10.1155/2022/8303504.
Copyright © 2024 Vikas Kumar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET63567
Publish Date : 2024-07-06
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here