Investigation of security in cloud computing
Cloud computing is a new and exciting field that is seeing an increase in activity and interest, especially in recent years. The advantages of cloud computing is numerous and well documented, and it seems increasingly likely that more and more companies and people are adopting...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2011
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/47553 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-47553 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-475532023-07-07T16:24:43Z Investigation of security in cloud computing Kristian Slamet. Chan Chee Keong School of Electrical and Electronic Engineering Tsai Flora S. DRNTU::Engineering::Computer science and engineering::Computing methodologies Cloud computing is a new and exciting field that is seeing an increase in activity and interest, especially in recent years. The advantages of cloud computing is numerous and well documented, and it seems increasingly likely that more and more companies and people are adopting cloud technology for both business and personal use. However, there are security issues which need to be properly addressed in order for widespread adoption by users around the world to be possible. This paper will look at the existing problems with cloud computing technology, and current available solutions. It will then introduce fully homomorphic encryption (FHE), one of the promising solutions to securing data level security in the cloud. The author will conduct experiments on the FHE codes, and show that current implementations of FHE is practically unfeasible. The author will also introduce how FHE can be used to secure a simple generic cloud database application, and discuss the timing and costing of securing a simple cloud based database using FHE. Bachelor of Engineering 2011-12-30T04:30:42Z 2011-12-30T04:30:42Z 2011 2011 Final Year Project (FYP) http://hdl.handle.net/10356/47553 en Nanyang Technological University 86 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Computing methodologies |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Computing methodologies Kristian Slamet. Investigation of security in cloud computing |
description |
Cloud computing is a new and exciting field that is seeing an increase in activity and
interest, especially in recent years. The advantages of cloud computing is numerous
and well documented, and it seems increasingly likely that more and more companies
and people are adopting cloud technology for both business and personal use.
However, there are security issues which need to be properly addressed in order for
widespread adoption by users around the world to be possible.
This paper will look at the existing problems with cloud computing technology,
and current available solutions. It will then introduce fully homomorphic encryption
(FHE), one of the promising solutions to securing data level security in the cloud.
The author will conduct experiments on the FHE codes, and show that current implementations
of FHE is practically unfeasible. The author will also introduce how
FHE can be used to secure a simple generic cloud database application, and discuss
the timing and costing of securing a simple cloud based database using FHE. |
author2 |
Chan Chee Keong |
author_facet |
Chan Chee Keong Kristian Slamet. |
format |
Final Year Project |
author |
Kristian Slamet. |
author_sort |
Kristian Slamet. |
title |
Investigation of security in cloud computing |
title_short |
Investigation of security in cloud computing |
title_full |
Investigation of security in cloud computing |
title_fullStr |
Investigation of security in cloud computing |
title_full_unstemmed |
Investigation of security in cloud computing |
title_sort |
investigation of security in cloud computing |
publishDate |
2011 |
url |
http://hdl.handle.net/10356/47553 |
_version_ |
1772827273929424896 |