A Survey on Information Security in Cloud Computing
DOI:
https://doi.org/10.13053/cys-24-2-3119Keywords:
Cloud computing, security, data integrity, data privacy, data protection, virtualization, elgamal encryptionAbstract
Cloud computing is a type of Internet-based computing that provides different services, is a way to increase capacity or add capabilities dynamically without investing in new infrastructure, training new staff or licensing new software. Cloud computing has gained popularity by providing easy and cost-effective access to IT (Information Technology). However, although it expands existing IT capabilities and although it has gone from being a promising business concept, to one of the fast growing segments; as more and more information about individuals and companies is placed in the cloud, concerns begin to grow about how secure the environment is. Security is one of the main problems that reduces the growth of cloud computing and the complications with privacy and data protection continue to affect the market. Users of cloud services should be vigilant to understand the risks of data breaches in this new environment. This article presents a survey of the different security risks that represent a threat to the cloud due to the nature of the service delivery models of a cloud computing system. On the other hand, works carried out with respect to security are also explored, such as Vigenère, Playfair, Hill and Vernan encryption, proxy re-encryption and Railfence cipher. With this work we hope to provide useful information about cloud computing security.Downloads
Published
2020-06-23
Issue
Section
Articles
License
Hereby I transfer exclusively to the Journal "Computación y Sistemas", published by the Computing Research Center (CIC-IPN),the Copyright of the aforementioned paper. I also accept that these
rights will not be transferred to any other publication, in any other format, language or other existing means of developing.I certify that the paper has not been previously disclosed or simultaneously submitted to any other publication, and that it does not contain material whose publication would violate the Copyright or other proprietary rights of any person, company or institution. I certify that I have the permission from the institution or company where I work or study to publish this work.The representative author accepts the responsibility for the publicationof this paper on behalf of each and every one of the authors.
This transfer is subject to the following conditions:- The authors retain all ownership rights (such as patent rights) of this work, except for the publishing rights transferred to the CIC, through this document.
- Authors retain the right to publish the work in whole or in part in any book they are the authors or publishers. They can also make use of this work in conferences, courses, personal web pages, and so on.
- Authors may include working as part of his thesis, for non-profit distribution only.