加密技术在云计算中的应用

A. Jaber, M. F. Zolkipli
{"title":"加密技术在云计算中的应用","authors":"A. Jaber, M. F. Zolkipli","doi":"10.1109/ICCSCE.2013.6719955","DOIUrl":null,"url":null,"abstract":"Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"18 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"58","resultStr":"{\"title\":\"Use of cryptography in cloud computing\",\"authors\":\"A. Jaber, M. F. Zolkipli\",\"doi\":\"10.1109/ICCSCE.2013.6719955\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system.\",\"PeriodicalId\":319285,\"journal\":{\"name\":\"2013 IEEE International Conference on Control System, Computing and Engineering\",\"volume\":\"18 7\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"58\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Conference on Control System, Computing and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSCE.2013.6719955\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Control System, Computing and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSCE.2013.6719955","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 58

摘要

云计算是一个平台,用于动态扩展功能和开发潜力,而无需使用新的基础设施、人员或软件系统。此外,云计算起源于一个商业企业概念,并发展成为一个蓬勃发展的IT发明。然而,鉴于个人和公司的大量信息在云中被识别,人们对云环境的安全性提出了担忧。尽管围绕云计算的宣传铺天盖地,但客户仍然不愿意将他们的商业企业部署到云中。然而,缺乏保护是阻碍云计算使用的唯一主要问题。此外,云计算管理数据保密和信息安全的复杂性使市场对云计算犹豫不决。当部署在云环境中时,云模型的架构会威胁到现有技术的安全性。因此,云服务的用户应该知道将数据上传到这个新环境的危险。因此,本文综述了对云计算构成威胁的不同加密方面。本文研究了在云计算系统中使用加密技术所带来的具体安全问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Use of cryptography in cloud computing
Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Digital aerial imagery of unmanned aerial vehicle for various applications Performance study of preliminary mini anechoic chamber fitted with coconut shell coated absorbers A new approach for the design of relay control circuits Design of ultra wideband rectangular microstrip notched patch antenna Delay compensation using PID controller and GA
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1