Cloud Cryptography

                                    Cloud Cryptography



Crypto cloud computing is a new secure cloud computing architecture. Cloud computing is a large-scale distributed computing model that is driven by economies of scale. It integrates a set of abstracted, virtualized, dynamically-scalable, and managed resources, such as computing power, storage, platforms, and services. External users can access resources over the Internet using terminals, especially mobile terminals. Cloud architectures are developed in an on-demand fashion. That is, the resources are dynamically assigned to a user according to his request, and relinquished after the job is done.

Cloud computing is a pool of services including the hardware and operating system infrastructure, the formation of systems management software, system, and platform, and virtualization components.

According to the level of its resources, cloud computing services can be divided into three categories

  • Infrastructure as a service (IaaS)
  • Platform as a service (PaaS)
  • Software as a service (SaaS)


While enjoying the convenience of cloud computing, network security risks cannot be ignored. A customer's data security relies on security service from cloud computing providers, however, the current structure of cloud computing services is provided by independent operators. First, the user's information security provides commerce and management. Second, information leakage can be caused by the technology flows of providers. What's more, cloud computing is an open environment. Hence, any weakness will cause information security risks to the whole system.



Crypto cloud computing is a new secure cloud computing architecture

It can provide protection of information security at the system level and allows users access to shared services conveniently and accurately. Crypto cloud computing protects individual's connections with the outside world. It can protect personal privacy without any delay in information exchange.

Crypto cloud computing is based on the Quantum Direct Key system. Quantum Direct Key (QDK) is a set of the advanced asymmetric offline key mechanism. In this mechanism, all entities get public and private key pair according to their ID. Each entity only holds its own private key but has a public key generator to generate any public key. In this system, an entity can produce the public key of any other entities offline, no third-party agency (such as CA) is necessary. Crypto cloud computing based on QDK can avoid network traffic congestion, and other drawbacks using the current encryption system.

In the crypto cloud computing system, each entity encrypts data using his/her own private key. All elements in the system such as cloud computing infrastructure units, platform, virtualization tools, and all involved entities have their own keys. While fulfilling their own functions of information exchange and processing, all these elements will use the public key and private key to perform authentication first. What's more, events that occur in cloud computing are also assigned a unique key. In this way, the crypto cloud system guarantees the security and credibility of information exchange.

The current cloud computing structure is developed for data and computing sharing. Security is not a priority of the system. On the contrary, encryption and security are inherently integrated into the crypto cloud computing based on the QDK. QDK authorized function units are bricks of crypto cloud computing. Besides the primary function of data en/decryption, crypto cloud computing also provides many security-related functions. For example, all channels sign transmit data using their own keys, and the receiving terminals can avoid hijacking by verifying the signature. What's more, the exact position of security leakage can be identified determined by analyzing digital signatures of forged data. Based on such capabilities, crypto-related functions can be provided as services in the cloud, which is named as ‘Crypto as a service (CAAS)’.


Crypto cloud computing is not only the advances in information technology but also the innovation of logical relationships. In a crypto cloud computing system, non-system data is not allowed to store and transmit. Private Key and offline public key, play a role in identification and certification in the process of information exchange. In this way, the cloud establishes a relationship of trust with a customer. Data identification depends on the logical relationship of mutual trust or need, and the logical relationship depends on the cloud customer.

Crypto cloud computing is a new framework for cyber resource sharing. It protects data security and privacy. Well, in the cloud environment, crypto cloud computing guarantees information security and integrity during the whole procedure.



There is no personal privacy under the current cloud framework, as pointed out by Mark Zuckerberg, 'the Age of Privacy Is Over '. However, with the development of crypto cloud computing, we can resolve the conflict between service data sharing and privacy security. It opens up new prospects for the development of information-sharing technology.

 

Article by: Kanupriya Chhundawat

Edited by: Aastha Soni


Comments

Popular posts from this blog

MAGIC OF MAHARASHTRA

Gondola in Venice

CN Tower