In the current study, the researcher has targeted to develop understanding regarding cryptography and its contribution in securing data distributed storages while using cloud storage system. In the comment of Boren and Brisson (2015), in presence of a large number of data theft mechanisms, data would be accessed at any form, even while transmission process is going on. Therefore, transformation of the data into a unique code accessible through specific or customized software would be a good option to assure data protection and confidentiality. In the context, Usman et al. (2017) stated that cryptography is the process of encoding the data into secret codes so that the raw data would be protected from theft. However, cryptography has diversified use in the data security mechanism based on the class of algorithm, used in the cryptography in different format.
The current research includes two main variables including cryptography and security of distributed data storage in cloud computing. It has been observed that in presence of big data and increasing amount of data worldwide, it has become difficult to store data in a single server or cloud system. Therefore, stored data have been segregated into fragments to store the same in different interconnected cloud system. Thus, being publicly accessible, the cloud computing system has become a vulnerable source of data to be transmitted through. However, there is no other alternative for data transmission and thus, data security has become one of the key aspects of the organizations and individual.
· How does cryptographic approach in the distributed data storage in cloud computing secure important and confidential data at the time of data transmission?
What is the usefulness of cryptography in data security?What are the key issues in distributed data storage system in cloud computing?How do such data leakage and transmission issues be resolved? How could the cryptography be utilized in securing distributed data storage in cloud computing?
Cryptography is one of the technical processes of transforming the raw data into secret code at the time of transmitting the same electronically. It possesses a list of codes followed by the installed sequence of algorithm with those codes to transform the data or text into secret code for protection purpose. According to Usman et al. (2017), cryptography is widely used in the data and network security mechanisms to secure important and confidential data due to availability of knowledge in interpreting the codes in general. It follows different algorithms while depending on the use of such cryptographic approach in different sectors and technical operations.
With the increasing number of data volume in the world, it has become a difficulty for a single cloud system to store a huge amount of data. Moreover, shifting a part of a big data would be troublesome in future in case of accessing the same from the internet (Todeschini et al. 2015). Thus, cloud computing system has therefore introduced the distributed data storage system where the upload data are distributed and stored in smaller fragments in different cloud storage. Thus, such type of distributed data storage is more public in nature and thus, accessible at any form. In this context, Glover (2015) stated that encoding the big data with secret code and a unique code language would be fruitful in case of securing confidential and important data while passing through distributed cloud computing system.
In context of the above case of data storage or transmission, cryptography would help in encoding the data into a secret code where the interpretation of the same would only be possible if the data is delivered to the destination server having special software of decoding the secret code. In this way, theft of confidential data and scope of data leakage would be reduced significantly. Supporting to the opinion of Wei et al. (2014), professional hackers would never be capable to interpret the data without a specific application designed for data security purpose.
Li et al. (2017) has delivered detailed information on the observations that increasing data security issues have restricted the cloud computing application in a number of fields. Moreover, the same issue also resists further development of the system for an improved featured storage system to store big data. the paper has also observed that it is the cloud operators who has the highest reach of the confidential data and thus, data protection is being violated.
Li et al. (2015) has worked on the hybrid cloud approach to be effective enough in conducting authorized duplication. Here, duplication has been emphasized as the prime factor, practices in many of the organizations and IT sectors to minimize the data piracy and duplicate data development. This hybrid cloud approach has been widely used in the cloud storage to reduce the storage space for faster data transmission. Data compression through duplication process is the main focus of this study.
Sicari et al. (2015) in the study has enlightened the data security issues due to Internet of Things. With the presence of different domains and fress transmission of data with an improved and confidential platform, data security policies are often breached for personal privilege or a further larger operation or theft.
Thus, it has been observed that the previous studies have already covered the aspects of cloud computing issues along with its integration with distributed data storage. However, the security breach and potential solution through cryptography approach has not been covered yet in detail which will be the moot aim of this research work.
In case of the research methodology, () stated that research onion is the most relevant and suitable research methodology framework to follow the same and carry out the research further. The nature of the current study is experimental or positivism as the study needs a large number of data regarding the application of cryptography and its use in securing dataset being transmitted and stored in the distributed cloud storage.
Therefore, based on the technical base of the current study, a mixture of both primary and secondary data would be fruitful for the study to analyse the application of cryptography in data security. In case of the primary data, interview with IT experts in different organizations would be apt in gathering primary data regarding application of cryptography in company and benefits attained from such applications. In that case, Ranganathan (2017) stated, selection of data in research plays pivotal role as it steers the study towards success.
On the other hand, secondary data would involve the application trend of cryptography and its benefits experienced in real life situations. In that case, case study analysis would be conducted for the current study to develop understanding regarding use of cryptography in data protection process, specifically in shared cloud system as the accessibility of such storage is higher than single server. In that case, Palinkas et al. (2015) stated that secondary analysis is safe approach as the risk of data fluctuation is quite low. However, Buchmann (2017) opined opposing the previous statement that primary analysis is more authentic in nature as the data are coming directly from the sources in terms of individual opinion and beliefs.
In that case, maintaining proper code of conduct is also the concern of the researcher to validate the research outcomes and make it acceptable to the reader. The research will not change the data for biased purpose where all data and its interpretation will be conducted at its real means.
Boren, S.L. and Brisson, A.J., 2015. Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks. U.S. Patent 9,166,782.
Buchmann, N., 2017. Research Data Collection of Prof. Dr. Nina Buchmann, Grassland Sciences Group: Process and system understanding of the functioning of terrestrial ecosystems and their provisioning of ecosystem services requires a wide range of research disciplines. Based on such a multidisciplinary approach, the Grassland Sciences Group focuses on two major research areas, functional plant diversity and ecosystem biogeochemistry, in particular, biospheric-atmospheric greenhouse gas exchange. In our group, we use ....
Glover, R., WORKSHARE Ltd, 2015. Method and system for securing documents on a remote shared storage resource. U.S. Patent 9,070,112.
Li, J., Li, Y.K., Chen, X., Lee, P.P. and Lou, W., 2015. A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5), pp.1206-1216.
Li, Y., Gai, K., Qiu, L., Qiu, M. and Zhao, H., 2017. Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, pp.103-115.
Palinkas, L.A., Horwitz, S.M., Green, C.A., Wisdom, J.P., Duan, N. and Hoagwood, K., 2015. Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Administration and Policy in Mental Health and Mental Health Services Research, 42(5), pp.533-544.
Ranganathan, C., 2017. Research Methdology: Process of Research.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
Todeschini, E., Deloge, S.P. and Anderson, D., Hand Held Products Inc, 2015. System and method for securing sensitive data. U.S. Patent 9,195,844.
Usman, M., Jan, M.A. and He, X., 2017. Cryptography-based secure data storage and sharing using HEVC and public clouds. Information Sciences, 387, pp.90-102.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.
Holding a PhD degree in Finance, Dr. John Adams is experienced in assisting students who are in dire need...
55 - Completed Orders
Canada, Toronto I have acquired my degree from Campion College at the University of Regina Occuption/Desi...
52 - Completed Orders
Even since I was a student in Italy I had a passion for languages, in fact I love teaching Italian, and I...
102 - Completed Orders
To work with an organization where I can optimally utilize my knowledge and skills for meeting challenges...
109 - Completed Orders