Research Article

Cryptography Challenges of Cloud Computing for E-Government Services

Volume: 2 Number: 1 June 28, 2018
Ahmet Efe , Hilal Nur Issı *
EN

Cryptography Challenges of Cloud Computing for E-Government Services

Abstract

Cloud computing is the popular technology and seems to be very promising for the future trends. In the cloud computing, programs and data are stored and sometimes processed in cloud. So data and programs can easy be accessible anywhere, anytime. Cloud computing is also a very applicable solution for e-government services due to cost effectiveness and efficiency of services. While it eliminates the need of maintaining costly computing facilities by companies and institutes, one of the barriers for cloud adoption is still security concerns. Out of cloud computing is depended upon internet, safety topics such as, confidentiality, authentication, privacy, and data securities are the main concerns. In the cloud, users should search encryption capabilities for preserving and retaining their data. In the same time, they have to protect the functionality of the underlying cloud applications. There are many encryption algorithms to encrypt the data. However, there are new varieties of cyber-attacks developed that threaten the data in the cloud infrastructure. These attacks allow the encrypted data to be re-encrypted, making it incomprehensible by the original owner of the data so that it becomes impossible for the user to decrypt it. This article is written to allow users to understand the working steps and challenges of the algorithms, comparisons of the algorithms and possible solutions for the resent threats in the cloud environment related with cryptography for e-government applications. 

Keywords

Cloud Computing,Cryptography,Data Security,RansomWare,E-government security

References

  1. 1. Uma Somani, Kanika Lakhani, Manish Mundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010)
  2. 2. Gurudatt Kulkarni, Nikita Chavan, Ruchira Chandorkar, Rani Waghmare, Rajnikant Palwe ,“ Cloud Security Challenges” , 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), 2012
  3. 3. Jeff Sedayao,“Enhancing Cloud Security Using Data Anonymization”, Intel IT - IT Best Practices Cloud Computing and Information Security, June 2012
  4. 4. Mr. Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing” 2013 International Conference on Communication Systems and Network Technologies (2013)
  5. 5. Mark D. Ryan, “Cloud computing security: The scientific challenge, and a survey of solutions” The Journal of Systems and Software (2013)
  6. 6. Duygu Sinanc, Seref Sagiroglu, “A Review on Cloud Security”, SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks (November 2013)
  7. 7. L. Xiao-hui, S. Xin-fang, “Analysis on Cloud Computing and its Security”, The 8th International Conference on Computer Science & Education (ICCSE 2013)
  8. 8. Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, “Data Security and Privacy in Cloud Computing”, International Journal of Distributed Sensor Networks (Volume 2014)
  9. 9. Alexandra Boldyreva, Georgia Tech and Paul Grubbs, “Making encryption work in the cloud”, Network Security (2014)
  10. 10. Akashdeep Bhardwaja, GVB Subrahmanyamb, Vinay Avasthic, Hanumat Sastryd, ”Security Algorithms for Cloud Computing”, International Conference on Computational Modeling and Security (CMS 2016)
APA
Efe, A., & Issı, H. N. (2018). Cryptography Challenges of Cloud Computing for E-Government Services. International Journal of Innovative Engineering Applications, 2(1), 4-14. https://izlik.org/JA42KW46SW
AMA
1.Efe A, Issı HN. Cryptography Challenges of Cloud Computing for E-Government Services. IJIEA. 2018;2(1):4-14. https://izlik.org/JA42KW46SW
Chicago
Efe, Ahmet, and Hilal Nur Issı. 2018. “Cryptography Challenges of Cloud Computing for E-Government Services”. International Journal of Innovative Engineering Applications 2 (1): 4-14. https://izlik.org/JA42KW46SW.
EndNote
Efe A, Issı HN (June 1, 2018) Cryptography Challenges of Cloud Computing for E-Government Services. International Journal of Innovative Engineering Applications 2 1 4–14.
IEEE
[1]A. Efe and H. N. Issı, “Cryptography Challenges of Cloud Computing for E-Government Services”, IJIEA, vol. 2, no. 1, pp. 4–14, June 2018, [Online]. Available: https://izlik.org/JA42KW46SW
ISNAD
Efe, Ahmet - Issı, Hilal Nur. “Cryptography Challenges of Cloud Computing for E-Government Services”. International Journal of Innovative Engineering Applications 2/1 (June 1, 2018): 4-14. https://izlik.org/JA42KW46SW.
JAMA
1.Efe A, Issı HN. Cryptography Challenges of Cloud Computing for E-Government Services. IJIEA. 2018;2:4–14.
MLA
Efe, Ahmet, and Hilal Nur Issı. “Cryptography Challenges of Cloud Computing for E-Government Services”. International Journal of Innovative Engineering Applications, vol. 2, no. 1, June 2018, pp. 4-14, https://izlik.org/JA42KW46SW.
Vancouver
1.Ahmet Efe, Hilal Nur Issı. Cryptography Challenges of Cloud Computing for E-Government Services. IJIEA [Internet]. 2018 Jun. 1;2(1):4-14. Available from: https://izlik.org/JA42KW46SW