An Analysis of Different Security Models and the Obstacles of Ensuring Security and Privacy while Storing Data on the Cloud
DOI:
https://doi.org/10.37256/cnc.2220244762Keywords:
RSA algorithm, public key cryptography, SEP, encryption, IaaS, PaaS, SaaSAbstract
Every day, cloud computing—which stores user data online—becomes more and more popular. Instead of being aware of security risks, the main goal of a cloud-based system is to use the internet as a storage medium. Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) are the three primary categories of cloud computing models. But as cloud computing has gotten more popular, security has grown to be a major worry. The difficulties with data storage in various cloud computing scenarios are examined in this research. It suggests using the Internet Protocol Security (IPsec) architecture as the foundation for the Security Encryption Privacy (SEP) paradigm. To improve security and stop assaults on cloud storage, it generates and encrypts data using the RSA algorithm and public key cryptography. In addition, our suggested approach is contrasted with alternative security models. This study’s primary goal is to comprehend cloud computing.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Shahid Naseem, et al.
This work is licensed under a Creative Commons Attribution 4.0 International License.