The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy.
Published in | International Journal on Data Science and Technology (Volume 4, Issue 1) |
DOI | 10.11648/j.ijdst.20180401.11 |
Page(s) | 1-5 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2018. Published by Science Publishing Group |
Cloud Computing, Cybersecurity, Cryptography, Passwords
[1] | E. FISCHER, “Cybersecurity Issues and Challenges,” Congressional Research Service, Washington, 2016. |
[2] | H. SINGH, “A Review of Cloud Computing Security Issues,” International Journal of Advances in Engineering and Technology, vol. 8, 2015. |
[3] | M. PATRA, “Cloud Computing,” IRACST, vol. 1, 2011. |
[4] | S. SAPATAPATHY, “Cloud Computing: Security,” IRACST, vol. 1, 2011. |
[5] | K. HAMLEN, “Security Issues for Cloud Computing,” Journal of University of Texas, vol. 6, 2010. |
[6] | G. MELL, “The NIST Definition of Cloud Computing version 15,” National Institute of Standars and technology, Information Technology Laboratory, USA, 2009. |
[7] | E. SIRON, Hyper-V Security, USA: PACKT, 2014. |
[8] | H. SWANSON, “NIST Special Publication 800-18 - Guideline for Developing Security Plans for Federal Information Systems,” US Department of Commerce, USA, 2006. |
[9] | V. WINKLER, Securing The Cloud, USA: Syngress, 2011. |
[10] | J. DOHERTY, SDN and NFV, Indiana - USA: Pearson, 2016. |
[11] | A. FERREIRA, Introdução ao Cloud Computing, Lisbon - Portugal: FCA, 2015. |
APA Style
Pedro Ramos Brandão. (2018). The Importance of Authentication and Encryption in Cloud Computing Framework Security. International Journal on Data Science and Technology, 4(1), 1-5. https://doi.org/10.11648/j.ijdst.20180401.11
ACS Style
Pedro Ramos Brandão. The Importance of Authentication and Encryption in Cloud Computing Framework Security. Int. J. Data Sci. Technol. 2018, 4(1), 1-5. doi: 10.11648/j.ijdst.20180401.11
AMA Style
Pedro Ramos Brandão. The Importance of Authentication and Encryption in Cloud Computing Framework Security. Int J Data Sci Technol. 2018;4(1):1-5. doi: 10.11648/j.ijdst.20180401.11
@article{10.11648/j.ijdst.20180401.11, author = {Pedro Ramos Brandão}, title = {The Importance of Authentication and Encryption in Cloud Computing Framework Security}, journal = {International Journal on Data Science and Technology}, volume = {4}, number = {1}, pages = {1-5}, doi = {10.11648/j.ijdst.20180401.11}, url = {https://doi.org/10.11648/j.ijdst.20180401.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijdst.20180401.11}, abstract = {The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy.}, year = {2018} }
TY - JOUR T1 - The Importance of Authentication and Encryption in Cloud Computing Framework Security AU - Pedro Ramos Brandão Y1 - 2018/04/20 PY - 2018 N1 - https://doi.org/10.11648/j.ijdst.20180401.11 DO - 10.11648/j.ijdst.20180401.11 T2 - International Journal on Data Science and Technology JF - International Journal on Data Science and Technology JO - International Journal on Data Science and Technology SP - 1 EP - 5 PB - Science Publishing Group SN - 2472-2235 UR - https://doi.org/10.11648/j.ijdst.20180401.11 AB - The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy. VL - 4 IS - 1 ER -