Encryption And Authenticity Issues In Cloud Computing: Rising Concern Of Cloud

Read Complete Research Material



Encryption and Authenticity Issues in Cloud Computing: Rising Concern of Cloud

By

Proposal Outline

Dissertation Proposal Outline1

CHAPTER 1: INTRODUCTION1

CHAPTER 1: INTORDUCTION6

Introduction6

Background of the Study7

Aims and Objectives of the Study9

Purpose of the Study10

Research Questions10

Rationale of the Study10

Significance of the Study11

CHAPTER 2: LITERATURE REVIEW12

Introduction12

Encryption Issues in the Current Cloud Platform13

Encryption in the Cloud15

Encryption Mechanisms for the Cloud Platform19

Dissertation Proposal Outline

Encryption and Authenticity Issues in Cloud Computing

Rising Concern of Cloud

This study will critically analyze the current encryption mechanisms associated with the cloud platform and to propose encryption measures that could be used for overcoming those issues. Businesses and organizations will only move towards the cloud platforms until they are convinced that their data is secure over the cloud platform and the information sent from one end to another is authentic.

Following is the chapter wise outline of the study

CHAPTER 1: INTRODUCTION

Chapter 1 of the dissertation will include a detailed background regarding the topic. The topic of the study is “Understanding the Encryption and Authenticity Issues in Cloud Computing: Rising Concern of Cloud”. Chapter 1 will provide a brief overview about the topic of the research and the purpose behind conducting this study. Aims and objectives of the study will also be presented in chapter 1 which will shape the overall flow of the dissertation. Following are some of the headings which will be included in chapter 1:

Background

Research Aim

Research Objectives

Scope of the Research

The research questions which will be studied in this study include:

Do the current encryption mechanisms provide effective encryption to the cloud users?

Do encryption mechanisms such as HE, OPE, PPR capable of overcoming the current authenticity issues associated with current cloud platform?

CHAPTER 2: LITERATURE REVIEW

The data drive business, so it is a very attractive prize for hackers and malware experts to subject to intense regulatory oversight. Businesses face challenges in the security of their sensitive data, the maintenance of compliance and minimizing risk, complexity and cost control. It has now become immensely important to provide business with flexible solutions to meet today's stringent requirements to guarantee the authenticity of their data. Data encryption has now emerged as basic requirement for all the organizations, particularly when it comes to cloud storage in its many forms.

In this chapter the researcher will discuss:

Encryption Issues in the Current Cloud Platform

Encryption in the Cloud

Encryption Mechanisms for the Cloud Platform

Homomorphic Encryption

Prefix-Preserving Encryption

Order-Preserving Encryption

CHAPTER 3: METHODOLOGY

This chapter discusses the research method that will be used for the study and its rationale.

The purpose of this quantitative is to analyze the current encryption mechanisms in order to identify the vulnerabilities in them, and then propose an effective and efficient encryption algorithm for overcoming those security issues. The study is intended to provide business decision makers with credible data about the factors influencing the adoption of cloud computing. This study will also contribute to the body of knowledge by providing empirical evidence on the encryption issues associated with cloud computing and it influence on cloud adoption that researchers can use to evaluate cloud ...