Get Similar Answers, Custom Writing & Assignment Help Services

To hire a writer, fill the order form in a few guided steps - with details from your paper's instructions.

Posted: November 9th, 2022

Cryptography and Data Security in Cloud Computing

Cryptography and Data Security in Cloud Computing Article Abstract

Cryptography and Data Security in Cloud Computing Article Abstract
Bibliographical Reference
Yan, Z., Deng, R. H., & Varadharajan, V. (2017). Cryptography and knowledge safety in cloud computing. Data Sciences, 387, 53-55. doi:10.1016/j.ins.2016.12.034
Aims
Upon Assessment of the article on, “Cryptography and knowledge safety in cloud computing” the three details addressed by the authors have been;
• The comfort cloud computing will carry to the subsequent technology comparable to a by means of the discount in storage burdens and comfort of knowledge storage.
• How cloud knowledge safety points have the potential of impeding the success of cloud computing as a consequence of instances of knowledge leakage, cyber -attacks and person distrust.
• The inefficiency of cryptography as a measure to carry privateness to cloud-stored knowledge.
Abstract
The article highlights the varied points of cryptography and knowledge safety in cloud computing. It provides a group of information from a number of authors by bringing essential points from totally different supplies. The primary space of focus being how cloud computing supplies a safe means of knowledge storage which is handy and sensible for years to come back. The article highlights how by use of the Excessive-Effectivity Video coding, knowledge might be simply saved extra securely by way of this sturdy scheme Trade also can happen extra effectively by use of this scheme. Different options are recognized that may make it higher for one to get enough storage that they may want. It may be estimated that the quantity of knowledge to be saved in the close to future will likely be fairly vital thus the necessity for higher options for this drawback. The clever cryptography method provides a division to knowledge whereas storing it in a distributed cloud server that brings a greater larger high quality answer to this predicament.
The article additionally talks about cloud knowledge privateness safety because of the potential risks with regard to knowledge safety points. Belief points have provide you with respect to how nicely one can use knowledge administration to retailer non-public info. The article stresses the necessity to use multi-user modification for databases to resolve integrity points. Customers inside this scheme can independently signal their knowledge to make sure that all knowledge is genuine to them. The writer approves the usage of different strategies right into a system comparable to the usage of context-aware and Incentive-based status mechanism whereby unhealthy mouthing assaults, in addition to collision assaults, might be evaluated in addition to solved as quickly as they happen. Different methods to deal with privateness problem in laptop programs is the usage of safe buddy matching that goals to attain knowledge trade amongst appropriate gadgets over the bodily and social networks on the identical time.
The ultimate key level highlighted by the writer is the connection between cryptography and cloud knowledge safety. The RSA algorithm supplies this since it’s the most trusted cloud computing safety measure. The writer helps the usage of the block Wiedemann algorithm that improves the execution of efficiency and communication prices in cloud computing providing higher time use steps. Encryption by means of order preserving (OPE) helps the usage of ciphertexts. Because the programs already in place endure points concerning safety of encryptions and ciphertext growth, the semi-order preserving encryption (SOPE) alternatively solves this problem by presenting itself as an alternative to the OPE. The SOPE makes use of the OPE to help a plethora of question in ciphertexts. It provides a steadiness between precision, safety and ciphertext growth by guaranteeing the SOPE are in line with the outlined circumstances.
Outcomes
After studying and reviewing this text, I really feel that has gained a bit of information regarding the following;
• There are a plethora of programs in place to resolve cryptography and knowledge safety points inside the cloud computing world. The options chosen will depend upon the difficulty at hand.
• It’s doable to have safe cloud knowledge storage by means of the usage of encryption of environment friendly schemes.
• The fixed indecision of cloud customers on whether or not or not they’re subscribed or not is what causes points of knowledge loss.
Critique
I really feel that the article was not nicely written. For my part, a variety of concepts from totally different authors have been compressed into one article whereby there was no circulate from one concept to the subsequent. Truthfully, anybody with out data of what cryptography or knowledge safety is might not profit in any approach from the article. There was no conclusion to the piece of labor; therefore a reader is left hanging on the finish of the studying. The article might have not directly completed its aims by presenting concepts from totally different people; nonetheless, it will not be the identical feeling a reader will get upon trying on the article. As in comparison with the e-book titled “Security engineering” by J. Anderson one can’t actually perceive the content material the writer was placing out concisely. This e-book is much a lot better at reaching the aims set by this text in a neater to know method.
Questions
The article thus prompts one to ask themselves a couple of questions. This is because of the truth that it doesn’t concisely deal with particular points.
1. How does cryptography relate to cloud computing?
2. Why is knowledge safety such a major facet in cloud computing?
three. How can a corporation mesh cryptography and knowledge safety into cloud computing whereas nonetheless sustaining a funds?

Reference
Anderson, R. J. (2010). Security Engineering: A Information to Constructing Reliable Distributed Techniques (2nd ed.). Hoboken, NJ: John Wiley & Sons.
Yan, Z., Deng, R. H., & Varadharajan, V. (2017). Cryptography and knowledge safety in cloud computing. Data Sciences, 387, 53-55. doi:10.1016/j.ins.2016.12.034

Order | Check Discount

Tags: Cryptography and Data Security in Cloud Computing Article Summary

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing Study Bay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

For Similar Answers, Custom Essay Writing & Assignment Help Services

Find an expert with a few clicks and guided steps, fill an order form for your nursing paper. We write AI-plagiarism free essays and research papers. Anytime!.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00