Open Access Open Access  Restricted Access Subscription or Fee Access

Overview of the Emerging Technology: Cloud Cryptograph

Akshita Vijay, Vikram Khandelwal

Abstract


Distributed computing gives clients a virtual registering framework on which you can store information and run applications. In any case, distributed computing thinks of new security challenges as cloud administrators are relied upon to control customer information without being completely trusted. From encouraging remote access to information to the digitization of the instruction framework, cloud innovation has contacted our lives from numerous points of view more than we understand. Today, pretty much every application we use is fueled by distributed computing. On the off chance that you need to take business on the web, you have to get your hands on this progressive innovation at the earliest opportunity. In addition, Cryptography is system of making sure about data and correspondences through utilization of codes so just those individual for whom the data is planned can get it and procedure it. In this way, forestalling unapproved access to data. The prefix "grave" signifies "covered up" and postfix graphy signifies "composing". The systems used to protect data in cryptography are built on numerical ideas and a lot of rule-based thinking known as computations to shift over messages in ways that make them difficult to translate. These computations are used to verify cryptographic key age, computerized marking, secure information security, web browsing on the web, and secure private exchanges, such as charge card and check card exchanges.


Full Text:

PDF

References


Farzam Ehsani. Blockchain in Finance: From Buzzword to Watchword in 2016 [Online]. Available from https://www.coindesk.com/markets/2016/12/20/blockchain-in-finance-from-buzzword-to-watchword-in-2016/

The Linux Foundation. Linux Foundation Unites Industry Leaders to Advance Blockchain Technology [Online]. Available from https://www.linuxfoundation.org/press-release/linux-foundation-unites-industry-leaders-to-advance-blockchain-technology/

Hyperledger Foundation. Open Source Blockchain Effort for the Enterprise Elects Leadership Positions and Gains New Investments. 2016. https://www.hyperledger.org/announcements/2016/03/29/open-source-blockchain-effort-for-the-enterprise-elects-leadership-positions-and-gains-new-investments

J. Leon Zhao, et al. Overview of business innovations and research opportunities in blockchain and introduction to the special issue. Financial Innovation. 2016;2(28).

Sarah Underwood. Blockchain beyond bitcoin. Communications of the ACM. 2016;(59) 11:15-17.

Gareth Peters, et al. Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money. Banking Beyond Banks and Money. 2016; 239-278.

Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. https://bitcoin.org/bitcoin.pdf

Dr. Christian Cachin, et al. Blockchain, cryptography, and consensus. ITU Workshop on “Security Aspects of Blockchain” (Geneva, Switzerland, 21 March 2017). 2017.

I. Agudo, D. Nuñez, G. Giammatteo, P. Rizomiliotis, and C. Lambrinoudakis, "Cryptography goes to the Cloud," Secure and Trust Computing, Data Management, and Applications, pp. 190-197: Springer, 2011.

G. Zhao, C. Rong, J. Li, F. Zhang, and Y. Tang, "Trusted data sharing over untrusted cloud storage providers." pp. 97-103.

M. G. Jaatun, A. A. Nyre, S. Alapnes, and G. Zhao, "A farewell to trust: An approach to confidentiality control in M. Van Dijk, and A. Juels, “On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing,” IACR Cryptology ePrint Archive, vol. 2010, pp. 305, 2010.

M. G. Jaatun, A. A. Nyre, S. Alapnes, and G. Zhao, "A farewell to trust: An approach to confidentiality control in M. Van Dijk, and A. Juels, “On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing,” IACR Cryptology ePrint Archive, vol. 2010, pp. 305, 2010.

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing." pp. 1-5.

A. A. Atayero, and O. Feyisetan, “Security issues in cloud computing: The potentials of homomorphic encryption,” Journal of Emerging Trends in Computing and Information Sciences, vol. 2, no. 10, pp. 546-552, 2011.

F. Rocha, and M. Correia, "Lucy in the sky without diamonds: Stealing confidential data in the cloud." pp. 129- 134.

T. K. Chakraborty, A. Dhami, P. Bansal, and T. Singh, "Enhanced public auditability & secure data storage in cloud computing." pp. 101-105.

A. Jangra, and R. Bala, "PASA: Privacy-Aware Security Algorithm for Cloud Computing," Intelligent Informatics, pp. 487-497: Springer, 2013.

K. Wazed Nafi, T. Shekha Kar, S. Anisul Hoque, and M. Hashem, “A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture,” 2013.

D. Eyers, and G. Russello, "Toward Unified and Flexible Security Policies Enforceable within the Cloud." pp. 181- 186.

Y. Dodis, W. Luo, S. Xu, and M. Yung, "Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software." pp. 57-58. Ronny, Stephan Grob, and Alexander Schill. Seigner, "SecCSIE: A Secure Cloud Storage Integrator for Enterprises," Commerce and Enterprise Computing (CEC), 2011 IEEE 13th Conference on, pp. 252-255, 2011.

S Nepal, S. Chen, and J. Yao, "DIaaS: Data integrity as a service in the cloud," Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 308-315, 2011.

C. Wang, K. Ren, W. Lou, and J. Li, "Toward publicly auditable secure cloud data storage services," Network, IEEE, pp. 19-24, 2010.

Q. LIeu, G. Wang, and J. Wu, "Efficient sharing of secure cloud storage services," Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, vol. 29, 2010.

Ronny, Stephan Grob, and Alexander Schill. Seigner, "SecCSIE: A Secure Cloud Storage Integrator for Enterprises," Commerce and Enterprise Computing (CEC), 2011 IEEE 13th Conference on, pp. 252-255, 2011.




DOI: https://doi.org/10.37628/ijocspl.v7i2.751

Refbacks

  • There are currently no refbacks.