Skip to Content
Security Designs for the Cloud, IoT, and Social Networking
book

Security Designs for the Cloud, IoT, and Social Networking

by Dac-Nhuong Le, Chintan Bhatt, Mani Madhukar
November 2019
Intermediate to advanced
300 pages
9h 40m
English
Wiley-Scrivener
Content preview from Security Designs for the Cloud, IoT, and Social Networking

CHAPTER 1ENCRYPTION ALGORITHM FOR DATA SECURITY IN CLOUD COMPUTING

ANINDITA DESARKAR1, AJANTA DAS2

1Department of Computer Science and Engineering, Jadavpur University, Kolkata, India

2Department of Computer Science and Engineering, University of Engineering & Management, Kolkata, Kolkata, India

Abstract

Cloud computing is the concept of using a virtual pool of resources to provide users with solutions to various computing problems via the internet. IT services are provided on an on-demand basis, which are accessible from anywhere, anytime through authorized users. “Storage as a Service” is one of the major services for the end users where sensitive data is stored in the cloud. As a result, data vulnerability becomes a common phenomenon where exploitation occurs through the provider or unauthorized users. So, data protection is the heart of data security where encryption algorithms play a major role. The greater complexity of these algorithms makes it more secure and safe compared to the other techniques. This chapter presents a few of the well-known encryption-decryption-based algorithms which are aimed at protecting cloud stored data from unauthorized access.

Keywords: Cloud computing, encryption algorithm, data security

1.1 Introduction

Cloud computing, which is the next-generation paradigm in computation, delivers applications and resources on an on-demand basis via the internet as services [1]. It provides an ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber-Vigilance and Digital Trust

Cyber-Vigilance and Digital Trust

Wiem Tounsi
Integration of Cloud Computing with Internet of Things

Integration of Cloud Computing with Internet of Things

Monika Mangla, Suneeta Satpathy, Bhagirathi Nayak, Sachi Nandan Mohanty
Smart Grid Security

Smart Grid Security

Florian Skopik, Paul Dr. Smith
Mobile Cloud Computing

Mobile Cloud Computing

Dijiang Huang, Huijun Wu

Publisher Resources

ISBN: 9781119592266Purchase book