DocumentCode :
3729407
Title :
The rise of Bring Your Own Encryption (BYOE) for secure data storage in Cloud databases
Author :
Sadia Syed;M. Ussenaiah
Author_Institution :
Dept of Computer Science, Vikrama Simhapuri University, Nellore, A.P, India
fYear :
2015
Firstpage :
1463
Lastpage :
1468
Abstract :
Data security is one of the biggest concerns in adopting Cloud computing. Cloud Computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In Cloud environment, users remotely store their data and relieve themselves from the hassle of local storage and maintenance. However, in this process, they lose control over their data. Existing approaches do not take all the facets into consideration viz. dynamic nature of Cloud, computation & communication overhead etc. In this paper, we propose a Data Storage Security Model to achieve storage correctness incorporating Cloud´s dynamic nature while maintaining low computation and communication cost. Encryption key management has become table stakes for cloud vendors, The ability to bring your own encryption keys is fast becoming ubiquitous in public cloud, but that doesn´t mean IT pros should retain control. Security concerns and data center oversight are two primary hang-ups for IT shops averse to adopting public cloud. Amazon became the first major infrastructure as a service (IaaS) vendor to offer bring your own key encryption in 2014 as an answer to some of those critiques. Over the past few weeks, Microsoft and Google have also advanced their cloud encryption key management capabilities. Vendors at every layer of the cloud stack have added encryption capabilities, and, eventually, all cloud vendors will offer some form of encryption and key management. Some vendors will opt to do it natively, while others will pass the control to customers so they can check off that box on their list of capabilities.
Keywords :
"Cloud computing","Encryption","Organizations","Law"
Publisher :
ieee
Conference_Titel :
Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on
Type :
conf
DOI :
10.1109/ICGCIoT.2015.7380698
Filename :
7380698
Link To Document :
بازگشت