Research Article
BibTex RIS Cite
Year 2018, Volume: 2 Issue: 1, 4 - 14, 28.06.2018

Abstract

References

  • 1. Uma Somani, Kanika Lakhani, Manish Mundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010)
  • 2. Gurudatt Kulkarni, Nikita Chavan, Ruchira Chandorkar, Rani Waghmare, Rajnikant Palwe ,“ Cloud Security Challenges” , 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), 2012
  • 3. Jeff Sedayao,“Enhancing Cloud Security Using Data Anonymization”, Intel IT - IT Best Practices Cloud Computing and Information Security, June 2012
  • 4. Mr. Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing” 2013 International Conference on Communication Systems and Network Technologies (2013)
  • 5. Mark D. Ryan, “Cloud computing security: The scientific challenge, and a survey of solutions” The Journal of Systems and Software (2013)
  • 6. Duygu Sinanc, Seref Sagiroglu, “A Review on Cloud Security”, SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks (November 2013)
  • 7. L. Xiao-hui, S. Xin-fang, “Analysis on Cloud Computing and its Security”, The 8th International Conference on Computer Science & Education (ICCSE 2013)
  • 8. Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, “Data Security and Privacy in Cloud Computing”, International Journal of Distributed Sensor Networks (Volume 2014)
  • 9. Alexandra Boldyreva, Georgia Tech and Paul Grubbs, “Making encryption work in the cloud”, Network Security (2014)
  • 10. Akashdeep Bhardwaja, GVB Subrahmanyamb, Vinay Avasthic, Hanumat Sastryd, ”Security Algorithms for Cloud Computing”, International Conference on Computational Modeling and Security (CMS 2016)
  • 11. Mohamed Al Morsy, John Grundy and Ingo Müller, “An Analysis of the Cloud Computing Security Problem”, Proceedings of the APSEC 2010 Cloud Workshop (September, 2016)
  • 12. Samet Akkuş, “Nesnelerin İnterneti Teknolojisinde Güvenli Veri İletişimi - Programlanabilir Fiziksel Platformlar Arasında WEP Algoritması ile Kriptolu Veri Haberleşmesi Uygulaması” Marmara Fen Bilimleri Dergisi (2016)
  • 13. Xu An Wanga, Jianfeng Mab, Fatos Xhafa, Mingwu Zhange, Xiaoshuang Luoc, “Cost-effective secure E-health cloud system using identity based cryptographic techniques”, Future Generation Computer Systems -67- (2017)
  • 14. Chao Yang, Mingyue Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren, “Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities, Pervasive and Mobile Computing (2017)
  • 15. Muhammad Baqer Mollaha,⁎, Md. Abul Kalam Azada, Athanasios Vasilakosb, “Security and privacy challenges in mobile cloud computing: Survey and way ahead”, Journal of Network and Computer Applications -84- (2017)
  • 16. Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming, Yiu, Kai Chen, “Multi-key privacy-preserving deep learning in cloud computing”, Future Generation Computer Systems (2017)
  • 17. Leandro Ventura Silva, Rodolfo Marinho, Jose Luis Vivas, Andrey Brito, “Security and privacy preserving data aggregation in cloud computing”, SAC '17 Proceedings of the Symposium on Applied Computing (2017)
  • 18. Raef Meeuwisse, “WannaCry: Is this a Watershed Cyber Security Moment?”, ISACA Now Blog (May,2017)
  • 19. Dikaiakos et.al, “Cloud Computing: Distributed Internet Computing for IT and Scientific Research”, IEEE, Volume 13, Issue 5, (Sept.-Oct. 2009)
  • 20. Liang-Jie Zhang et.al, “CCOA: Cloud Computing Open Architecture”, IEEE (6-10 July 2009)
  • 21. https://github.com/gentilkiwi/wanakiwi#wanakiwi
  • 22. Keijo Ruohonen, “Mathematıcal Cryptology” 2014 http://math.tut.fi/~ruohonen/MC.pdf
  • 23. Santosh Kumar Yadav, “Some Problems in Symmetric and Asymmetric Cryptography” A thesis submitted for the partial fulfillment of the degree of Doctor of Philosophy in Mathematics, 2010
  • 24. Daniel A. Rodr´ıguez Silva David Gonzalez Martinez, Enrique Argones Rua, “Secure Crypto-Biometric System for Cloud Computing” Conference Paper • September 2011 DOI: 10.1109/IWSSCloud.2011.6049023
  • 25. S. S. Manikandasaran, “Security Attacks and Cryptography Solutions for Data Stored in Public Cloud Storage” IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol.6, No1, Jan-Feb 2016 498
  • 26. Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent, “ID-Based Cryptography for Secure Cloud Data Storage” http://www-public.tem-tsp.eu/~lauren_m/articles/2013-cloud-IDbased-cloudstorage.pdf
  • 27. Ramaswamy Chandramouli Michaela Iorga Santosh Chokhani, “Cryptographic Key Management Issues & Challenges in Cloud Services” http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7956.pdf
  • 28. Sashank Dara, “Cryptography Challenges for Computational Privacy in Public Clouds” https://eprint.iacr.org/2013/272.pdf
  • 29. Radhika Patwari, Sarita Choudhary, “Security issues and Cryptographic techniques in Cloud Computing” International Journal of Innovative Computer Science & Engineering Volume 2 Issue 4; September-October-2015; Page No.01-06
  • 30. Aikaterini Mitrokotsa, Christos Douligeris, “E-Government and Denial of Service Attacks” 2008 DOI: 10.4018/978-1-59904-937-3.ch00 https://pdfs.semanticscholar.org/eee6/d5c3e55db3278f9421563e77c3f39ead8441.pdf
  • 31. Alarifi S, Wolthusen SD. “Mitigation of cloud-internal denial of service attacks”. in Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on. IEEE, 2014.
  • 32. Mell P, Grance T. “The NIST Definition of Cloud Computing”. National Institute of Standards and Technology (NIST): Gaithersburg, MD, 2011.
  • 33. Grobauer B, Walloschek T, Stocker E. “Understanding cloud computing vulnerabilities”. Security & privacy, IEEE 2011; 9(2): 50–57.
  • 34. J. Varia, “Best practices in architecting cloud applications in the AWS cloud”, Cloud Computing. Principles and Paradigms, John Wiley & Sons, Inc. Jan 2011, pp. 459-490.
  • 35. U. Oktay and O. K. Sahingoz, “Attack Types and Intrusion Detection Systems in Cloud Computing,” vol. 9, pp. 71–76, 2013.

Cryptography Challenges of Cloud Computing for E-Government Services

Year 2018, Volume: 2 Issue: 1, 4 - 14, 28.06.2018

Abstract

Cloud computing is the popular technology and seems to be very promising
for the future trends. In the cloud computing, programs and data are stored and
sometimes processed in cloud. So data and programs can easy be accessible
anywhere, anytime. Cloud computing is also a very applicable solution for
e-government services due to cost effectiveness and efficiency of services.
While it eliminates the need of maintaining costly computing facilities by
companies and institutes, one of the barriers for cloud adoption is still
security concerns. Out of cloud computing is depended upon internet, safety
topics such as, confidentiality, authentication, privacy, and data securities
are the main concerns. In the cloud, users should search encryption
capabilities for preserving and retaining their data. In the same time, they
have to protect the functionality of the underlying cloud applications. There
are many encryption algorithms to encrypt the data. However, there are new
varieties of cyber-attacks developed that threaten the data in the cloud
infrastructure. These attacks allow the encrypted data to be re-encrypted,
making it incomprehensible by the original owner of the data so that it becomes
impossible for the user to decrypt it. This article is written to allow users to
understand the working steps and challenges of the algorithms, comparisons of
the algorithms and possible solutions for the resent threats in the cloud
environment related with cryptography for e-government applications. 

References

  • 1. Uma Somani, Kanika Lakhani, Manish Mundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010)
  • 2. Gurudatt Kulkarni, Nikita Chavan, Ruchira Chandorkar, Rani Waghmare, Rajnikant Palwe ,“ Cloud Security Challenges” , 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), 2012
  • 3. Jeff Sedayao,“Enhancing Cloud Security Using Data Anonymization”, Intel IT - IT Best Practices Cloud Computing and Information Security, June 2012
  • 4. Mr. Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing” 2013 International Conference on Communication Systems and Network Technologies (2013)
  • 5. Mark D. Ryan, “Cloud computing security: The scientific challenge, and a survey of solutions” The Journal of Systems and Software (2013)
  • 6. Duygu Sinanc, Seref Sagiroglu, “A Review on Cloud Security”, SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks (November 2013)
  • 7. L. Xiao-hui, S. Xin-fang, “Analysis on Cloud Computing and its Security”, The 8th International Conference on Computer Science & Education (ICCSE 2013)
  • 8. Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, “Data Security and Privacy in Cloud Computing”, International Journal of Distributed Sensor Networks (Volume 2014)
  • 9. Alexandra Boldyreva, Georgia Tech and Paul Grubbs, “Making encryption work in the cloud”, Network Security (2014)
  • 10. Akashdeep Bhardwaja, GVB Subrahmanyamb, Vinay Avasthic, Hanumat Sastryd, ”Security Algorithms for Cloud Computing”, International Conference on Computational Modeling and Security (CMS 2016)
  • 11. Mohamed Al Morsy, John Grundy and Ingo Müller, “An Analysis of the Cloud Computing Security Problem”, Proceedings of the APSEC 2010 Cloud Workshop (September, 2016)
  • 12. Samet Akkuş, “Nesnelerin İnterneti Teknolojisinde Güvenli Veri İletişimi - Programlanabilir Fiziksel Platformlar Arasında WEP Algoritması ile Kriptolu Veri Haberleşmesi Uygulaması” Marmara Fen Bilimleri Dergisi (2016)
  • 13. Xu An Wanga, Jianfeng Mab, Fatos Xhafa, Mingwu Zhange, Xiaoshuang Luoc, “Cost-effective secure E-health cloud system using identity based cryptographic techniques”, Future Generation Computer Systems -67- (2017)
  • 14. Chao Yang, Mingyue Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren, “Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities, Pervasive and Mobile Computing (2017)
  • 15. Muhammad Baqer Mollaha,⁎, Md. Abul Kalam Azada, Athanasios Vasilakosb, “Security and privacy challenges in mobile cloud computing: Survey and way ahead”, Journal of Network and Computer Applications -84- (2017)
  • 16. Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming, Yiu, Kai Chen, “Multi-key privacy-preserving deep learning in cloud computing”, Future Generation Computer Systems (2017)
  • 17. Leandro Ventura Silva, Rodolfo Marinho, Jose Luis Vivas, Andrey Brito, “Security and privacy preserving data aggregation in cloud computing”, SAC '17 Proceedings of the Symposium on Applied Computing (2017)
  • 18. Raef Meeuwisse, “WannaCry: Is this a Watershed Cyber Security Moment?”, ISACA Now Blog (May,2017)
  • 19. Dikaiakos et.al, “Cloud Computing: Distributed Internet Computing for IT and Scientific Research”, IEEE, Volume 13, Issue 5, (Sept.-Oct. 2009)
  • 20. Liang-Jie Zhang et.al, “CCOA: Cloud Computing Open Architecture”, IEEE (6-10 July 2009)
  • 21. https://github.com/gentilkiwi/wanakiwi#wanakiwi
  • 22. Keijo Ruohonen, “Mathematıcal Cryptology” 2014 http://math.tut.fi/~ruohonen/MC.pdf
  • 23. Santosh Kumar Yadav, “Some Problems in Symmetric and Asymmetric Cryptography” A thesis submitted for the partial fulfillment of the degree of Doctor of Philosophy in Mathematics, 2010
  • 24. Daniel A. Rodr´ıguez Silva David Gonzalez Martinez, Enrique Argones Rua, “Secure Crypto-Biometric System for Cloud Computing” Conference Paper • September 2011 DOI: 10.1109/IWSSCloud.2011.6049023
  • 25. S. S. Manikandasaran, “Security Attacks and Cryptography Solutions for Data Stored in Public Cloud Storage” IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol.6, No1, Jan-Feb 2016 498
  • 26. Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent, “ID-Based Cryptography for Secure Cloud Data Storage” http://www-public.tem-tsp.eu/~lauren_m/articles/2013-cloud-IDbased-cloudstorage.pdf
  • 27. Ramaswamy Chandramouli Michaela Iorga Santosh Chokhani, “Cryptographic Key Management Issues & Challenges in Cloud Services” http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7956.pdf
  • 28. Sashank Dara, “Cryptography Challenges for Computational Privacy in Public Clouds” https://eprint.iacr.org/2013/272.pdf
  • 29. Radhika Patwari, Sarita Choudhary, “Security issues and Cryptographic techniques in Cloud Computing” International Journal of Innovative Computer Science & Engineering Volume 2 Issue 4; September-October-2015; Page No.01-06
  • 30. Aikaterini Mitrokotsa, Christos Douligeris, “E-Government and Denial of Service Attacks” 2008 DOI: 10.4018/978-1-59904-937-3.ch00 https://pdfs.semanticscholar.org/eee6/d5c3e55db3278f9421563e77c3f39ead8441.pdf
  • 31. Alarifi S, Wolthusen SD. “Mitigation of cloud-internal denial of service attacks”. in Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on. IEEE, 2014.
  • 32. Mell P, Grance T. “The NIST Definition of Cloud Computing”. National Institute of Standards and Technology (NIST): Gaithersburg, MD, 2011.
  • 33. Grobauer B, Walloschek T, Stocker E. “Understanding cloud computing vulnerabilities”. Security & privacy, IEEE 2011; 9(2): 50–57.
  • 34. J. Varia, “Best practices in architecting cloud applications in the AWS cloud”, Cloud Computing. Principles and Paradigms, John Wiley & Sons, Inc. Jan 2011, pp. 459-490.
  • 35. U. Oktay and O. K. Sahingoz, “Attack Types and Intrusion Detection Systems in Cloud Computing,” vol. 9, pp. 71–76, 2013.
There are 35 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Ahmet Efe

Hilal Nur Issı This is me

Publication Date June 28, 2018
Submission Date March 7, 2018
Published in Issue Year 2018 Volume: 2 Issue: 1

Cite

APA Efe, A., & Issı, H. N. (2018). Cryptography Challenges of Cloud Computing for E-Government Services. International Journal of Innovative Engineering Applications, 2(1), 4-14.
AMA Efe A, Issı HN. Cryptography Challenges of Cloud Computing for E-Government Services. IJIEA. June 2018;2(1):4-14.
Chicago Efe, Ahmet, and Hilal Nur Issı. “Cryptography Challenges of Cloud Computing for E-Government Services”. International Journal of Innovative Engineering Applications 2, no. 1 (June 2018): 4-14.
EndNote Efe A, Issı HN (June 1, 2018) Cryptography Challenges of Cloud Computing for E-Government Services. International Journal of Innovative Engineering Applications 2 1 4–14.
IEEE A. Efe and H. N. Issı, “Cryptography Challenges of Cloud Computing for E-Government Services”, IJIEA, vol. 2, no. 1, pp. 4–14, 2018.
ISNAD Efe, Ahmet - Issı, Hilal Nur. “Cryptography Challenges of Cloud Computing for E-Government Services”. International Journal of Innovative Engineering Applications 2/1 (June 2018), 4-14.
JAMA Efe A, Issı HN. Cryptography Challenges of Cloud Computing for E-Government Services. IJIEA. 2018;2:4–14.
MLA Efe, Ahmet and Hilal Nur Issı. “Cryptography Challenges of Cloud Computing for E-Government Services”. International Journal of Innovative Engineering Applications, vol. 2, no. 1, 2018, pp. 4-14.
Vancouver Efe A, Issı HN. Cryptography Challenges of Cloud Computing for E-Government Services. IJIEA. 2018;2(1):4-14.