Volume 4, Issue 1, March 2018, Page: 1-5
The Importance of Authentication and Encryption in Cloud Computing Framework Security
Pedro Ramos Brandão, Interdisciplinary Center of History, Cultures and Societies, Évora University, Évora, Portugal
Received: Mar. 18, 2018;       Accepted: Mar. 29, 2018;       Published: Apr. 20, 2018
DOI: 10.11648/j.ijdst.20180401.11      View  1341      Downloads  101
Abstract
The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy.
Keywords
Cloud Computing, Cybersecurity, Cryptography, Passwords
To cite this article
Pedro Ramos Brandão, The Importance of Authentication and Encryption in Cloud Computing Framework Security, International Journal on Data Science and Technology. Vol. 4, No. 1, 2018, pp. 1-5. doi: 10.11648/j.ijdst.20180401.11
Copyright
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reference
[1]
E. FISCHER, “Cybersecurity Issues and Challenges,” Congressional Research Service, Washington, 2016.
[2]
H. SINGH, “A Review of Cloud Computing Security Issues,” International Journal of Advances in Engineering and Technology, vol. 8, 2015.
[3]
M. PATRA, “Cloud Computing,” IRACST, vol. 1, 2011.
[4]
S. SAPATAPATHY, “Cloud Computing: Security,” IRACST, vol. 1, 2011.
[5]
K. HAMLEN, “Security Issues for Cloud Computing,” Journal of University of Texas, vol. 6, 2010.
[6]
G. MELL, “The NIST Definition of Cloud Computing version 15,” National Institute of Standars and technology, Information Technology Laboratory, USA, 2009.
[7]
E. SIRON, Hyper-V Security, USA: PACKT, 2014.
[8]
H. SWANSON, “NIST Special Publication 800-18 - Guideline for Developing Security Plans for Federal Information Systems,” US Department of Commerce, USA, 2006.
[9]
V. WINKLER, Securing The Cloud, USA: Syngress, 2011.
[10]
J. DOHERTY, SDN and NFV, Indiana - USA: Pearson, 2016.
[11]
A. FERREIRA, Introdução ao Cloud Computing, Lisbon - Portugal: FCA, 2015.
Browse journals by subject