International Journal on Data Science and Technology

| Peer-Reviewed |

The Importance of Authentication and Encryption in Cloud Computing Framework Security

Received: 18 March 2018    Accepted: 29 March 2018    Published: 20 April 2018
Views:       Downloads:

Share This Article

Abstract

The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy.

DOI 10.11648/j.ijdst.20180401.11
Published in International Journal on Data Science and Technology (Volume 4, Issue 1, March 2018)
Page(s) 1-5
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cloud Computing, Cybersecurity, Cryptography, Passwords

References
[1] E. FISCHER, “Cybersecurity Issues and Challenges,” Congressional Research Service, Washington, 2016.
[2] H. SINGH, “A Review of Cloud Computing Security Issues,” International Journal of Advances in Engineering and Technology, vol. 8, 2015.
[3] M. PATRA, “Cloud Computing,” IRACST, vol. 1, 2011.
[4] S. SAPATAPATHY, “Cloud Computing: Security,” IRACST, vol. 1, 2011.
[5] K. HAMLEN, “Security Issues for Cloud Computing,” Journal of University of Texas, vol. 6, 2010.
[6] G. MELL, “The NIST Definition of Cloud Computing version 15,” National Institute of Standars and technology, Information Technology Laboratory, USA, 2009.
[7] E. SIRON, Hyper-V Security, USA: PACKT, 2014.
[8] H. SWANSON, “NIST Special Publication 800-18 - Guideline for Developing Security Plans for Federal Information Systems,” US Department of Commerce, USA, 2006.
[9] V. WINKLER, Securing The Cloud, USA: Syngress, 2011.
[10] J. DOHERTY, SDN and NFV, Indiana - USA: Pearson, 2016.
[11] A. FERREIRA, Introdução ao Cloud Computing, Lisbon - Portugal: FCA, 2015.
Author Information
Cite This Article
  • APA Style

    Pedro Ramos Brandão. (2018). The Importance of Authentication and Encryption in Cloud Computing Framework Security. International Journal on Data Science and Technology, 4(1), 1-5. https://doi.org/10.11648/j.ijdst.20180401.11

    Copy | Download

    ACS Style

    Pedro Ramos Brandão. The Importance of Authentication and Encryption in Cloud Computing Framework Security. Int. J. Data Sci. Technol. 2018, 4(1), 1-5. doi: 10.11648/j.ijdst.20180401.11

    Copy | Download

    AMA Style

    Pedro Ramos Brandão. The Importance of Authentication and Encryption in Cloud Computing Framework Security. Int J Data Sci Technol. 2018;4(1):1-5. doi: 10.11648/j.ijdst.20180401.11

    Copy | Download

  • @article{10.11648/j.ijdst.20180401.11,
      author = {Pedro Ramos Brandão},
      title = {The Importance of Authentication and Encryption in Cloud Computing Framework Security},
      journal = {International Journal on Data Science and Technology},
      volume = {4},
      number = {1},
      pages = {1-5},
      doi = {10.11648/j.ijdst.20180401.11},
      url = {https://doi.org/10.11648/j.ijdst.20180401.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ijdst.20180401.11},
      abstract = {The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy.},
     year = {2018}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - The Importance of Authentication and Encryption in Cloud Computing Framework Security
    AU  - Pedro Ramos Brandão
    Y1  - 2018/04/20
    PY  - 2018
    N1  - https://doi.org/10.11648/j.ijdst.20180401.11
    DO  - 10.11648/j.ijdst.20180401.11
    T2  - International Journal on Data Science and Technology
    JF  - International Journal on Data Science and Technology
    JO  - International Journal on Data Science and Technology
    SP  - 1
    EP  - 5
    PB  - Science Publishing Group
    SN  - 2472-2235
    UR  - https://doi.org/10.11648/j.ijdst.20180401.11
    AB  - The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy.
    VL  - 4
    IS  - 1
    ER  - 

    Copy | Download

  • Sections