Encryption and Authenticity Issues in Cloud Computing: Rising Concern of Cloud
By
Proposal Outline
Dissertation Proposal Outline1
CHAPTER 1: INTRODUCTION1
CHAPTER 1: INTORDUCTION6
Introduction6
Background of the Study7
Aims and Objectives of the Study9
Purpose of the Study10
Research Questions10
Rationale of the Study10
Significance of the Study11
CHAPTER 2: LITERATURE REVIEW12
Introduction12
Encryption Issues in the Current Cloud Platform13
Encryption in the Cloud15
Encryption Mechanisms for the Cloud Platform19
Dissertation Proposal Outline
Encryption and Authenticity Issues in Cloud Computing
Rising Concern of Cloud
This study will critically analyze the current encryption mechanisms associated with the cloud platform and to propose encryption measures that could be used for overcoming those issues. Businesses and organizations will only move towards the cloud platforms until they are convinced that their data is secure over the cloud platform and the information sent from one end to another is authentic.
Following is the chapter wise outline of the study
CHAPTER 1: INTRODUCTION
Chapter 1 of the dissertation will include a detailed background regarding the topic. The topic of the study is “Understanding the Encryption and Authenticity Issues in Cloud Computing: Rising Concern of Cloud”. Chapter 1 will provide a brief overview about the topic of the research and the purpose behind conducting this study. Aims and objectives of the study will also be presented in chapter 1 which will shape the overall flow of the dissertation. Following are some of the headings which will be included in chapter 1:
Background
Research Aim
Research Objectives
Scope of the Research
The research questions which will be studied in this study include:
Do the current encryption mechanisms provide effective encryption to the cloud users?
Do encryption mechanisms such as HE, OPE, PPR capable of overcoming the current authenticity issues associated with current cloud platform?
CHAPTER 2: LITERATURE REVIEW
The data drive business, so it is a very attractive prize for hackers and malware experts to subject to intense regulatory oversight. Businesses face challenges in the security of their sensitive data, the maintenance of compliance and minimizing risk, complexity and cost control. It has now become immensely important to provide business with flexible solutions to meet today's stringent requirements to guarantee the authenticity of their data. Data encryption has now emerged as basic requirement for all the organizations, particularly when it comes to cloud storage in its many forms.
In this chapter the researcher will discuss:
Encryption Issues in the Current Cloud Platform
Encryption in the Cloud
Encryption Mechanisms for the Cloud Platform
Homomorphic Encryption
Prefix-Preserving Encryption
Order-Preserving Encryption
CHAPTER 3: METHODOLOGY
This chapter discusses the research method that will be used for the study and its rationale.
The purpose of this quantitative is to analyze the current encryption mechanisms in order to identify the vulnerabilities in them, and then propose an effective and efficient encryption algorithm for overcoming those security issues. The study is intended to provide business decision makers with credible data about the factors influencing the adoption of cloud computing. This study will also contribute to the body of knowledge by providing empirical evidence on the encryption issues associated with cloud computing and it influence on cloud adoption that researchers can use to evaluate cloud ...