The Importance of Authentication and Encryption in Cloud Computing Framework Security
International Journal on Data Science and Technology
Volume 4, Issue 1, March 2018, Pages: 1-5
Received: Mar. 18, 2018; Accepted: Mar. 29, 2018; Published: Apr. 20, 2018
Views 778      Downloads 53
Author
Pedro Ramos Brandão, Interdisciplinary Center of History, Cultures and Societies, Évora University, Évora, Portugal
Article Tools
Follow on us
Abstract
The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy.
Keywords
Cloud Computing, Cybersecurity, Cryptography, Passwords
To cite this article
Pedro Ramos Brandão, The Importance of Authentication and Encryption in Cloud Computing Framework Security, International Journal on Data Science and Technology. Vol. 4, No. 1, 2018, pp. 1-5. doi: 10.11648/j.ijdst.20180401.11
Copyright
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
E. FISCHER, “Cybersecurity Issues and Challenges,” Congressional Research Service, Washington, 2016.
[2]
H. SINGH, “A Review of Cloud Computing Security Issues,” International Journal of Advances in Engineering and Technology, vol. 8, 2015.
[3]
M. PATRA, “Cloud Computing,” IRACST, vol. 1, 2011.
[4]
S. SAPATAPATHY, “Cloud Computing: Security,” IRACST, vol. 1, 2011.
[5]
K. HAMLEN, “Security Issues for Cloud Computing,” Journal of University of Texas, vol. 6, 2010.
[6]
G. MELL, “The NIST Definition of Cloud Computing version 15,” National Institute of Standars and technology, Information Technology Laboratory, USA, 2009.
[7]
E. SIRON, Hyper-V Security, USA: PACKT, 2014.
[8]
H. SWANSON, “NIST Special Publication 800-18 - Guideline for Developing Security Plans for Federal Information Systems,” US Department of Commerce, USA, 2006.
[9]
V. WINKLER, Securing The Cloud, USA: Syngress, 2011.
[10]
J. DOHERTY, SDN and NFV, Indiana - USA: Pearson, 2016.
[11]
A. FERREIRA, Introdução ao Cloud Computing, Lisbon - Portugal: FCA, 2015.
ADDRESS
Science Publishing Group
548 FASHION AVENUE
NEW YORK, NY 10018
U.S.A.
Tel: (001)347-688-8931