Q

The assignment on Cryptographic Approach for Securing Distributed Data Storage in Cloud Computing to grow understandig

Home, - Cryptographic Approach for Securing Distributed Data Storage in Cloud Computing

Cryptographic Approach for Securing Distributed Data Storage in Cloud Computing

Introduction:

In the current study, the researcher has targeted to develop understanding regarding cryptography and its contribution in securing data distributed storages while using cloud storage system. In the comment of Boren and Brisson (2015), in presence of a large number of data theft mechanisms, data would be accessed at any form, even while transmission process is going on. Therefore, transformation of the data into a unique code accessible through specific or customized software would be a good option to assure data protection and confidentiality. In the context, Usman et al. (2017) stated that cryptography is the process of encoding the data into secret codes so that the raw data would be protected from theft. However, cryptography has diversified use in the data security mechanism based on the class of algorithm, used in the cryptography in different format. 

The current research includes two main variables including cryptography and security of distributed data storage in cloud computing. It has been observed that in presence of big data and increasing amount of data worldwide, it has become difficult to store data in a single server or cloud system. Therefore, stored data have been segregated into fragments to store the same in different interconnected cloud system. Thus, being publicly accessible, the cloud computing system has become a vulnerable source of data to be transmitted through. However, there is no other alternative for data transmission and thus, data security has become one of the key aspects of the organizations and individual. 

Literature review:

Cryptography:

Cryptography is one of the technical processes of transforming the raw data into secret code at the time of transmitting the same electronically. It possesses a list of codes followed by the installed sequence of algorithm with those codes to transform the data or text into secret code for protection purpose. According to Usman et al. (2017), cryptography is widely used in the data and network security mechanisms to secure important and confidential data due to availability of knowledge in interpreting the codes in general. It follows different algorithms while depending on the use of such cryptographic approach in different sectors and technical operations.

Use of cryptography in distributed data storage in cloud computing:

With the increasing number of data volume in the world, it has become a difficulty for a single cloud system to store a huge amount of data. Moreover, shifting a part of a big data would be troublesome in future in case of accessing the same from the internet (Todeschini et al. 2015). Thus, cloud computing system has therefore introduced the distributed data storage system where the upload data are distributed and stored in smaller fragments in different cloud storage. Thus, such type of distributed data storage is more public in nature and thus, accessible at any form. In this context, Glover (2015) stated that encoding the big data with secret code and a unique code language would be fruitful in case of securing confidential and important data while passing through distributed cloud computing system. 

In context of the above case of data storage or transmission, cryptography would help in encoding the data into a secret code where the interpretation of the same would only be possible if the data is delivered to the destination server having special software of decoding the secret code. In this way, theft of confidential data and scope of data leakage would be reduced significantly. Supporting to the opinion of Wei et al. (2014), professional hackers would never be capable to interpret the data without a specific application designed for data security purpose. 

Previous researches:

Li et al. (2017) has delivered detailed information on the observations that increasing data security issues have restricted the cloud computing application in a number of fields. Moreover, the same issue also resists further development of the system for an improved featured storage system to store big data. the paper has also observed that it is the cloud operators who has the highest reach of the confidential data and thus, data protection is being violated. 

Li et al. (2015) has worked on the hybrid cloud approach to be effective enough in conducting authorized duplication. Here, duplication has been emphasized as the prime factor, practices in many of the organizations and IT sectors to minimize the data piracy and duplicate data development. This hybrid cloud approach has been widely used in the cloud storage to reduce the storage space for faster data transmission. Data compression through duplication process is the main focus of this study. 

Sicari et al. (2015) in the study has enlightened the data security issues due to Internet of Things. With the presence of different domains and fress transmission of data with an improved and confidential platform, data security policies are often breached for personal privilege or a further larger operation or theft. 

Gap of literature:

Thus, it has been observed that the previous studies have already covered the aspects of cloud computing issues along with its integration with distributed data storage. However, the security breach and potential solution through cryptography approach has not been covered yet in detail which will be the moot aim of this research work.

Methodology:

In case of the research methodology, () stated that research onion is the most relevant and suitable research methodology framework to follow the same and carry out the research further. The nature of the current study is experimental or positivism as the study needs a large number of data regarding the application of cryptography and its use in securing dataset being transmitted and stored in the distributed cloud storage.  

Therefore, based on the technical base of the current study, a mixture of both primary and secondary data would be fruitful for the study to analyse the application of cryptography in data security. In case of the primary data, interview with IT experts in different organizations would be apt in gathering primary data regarding application of cryptography in company and benefits attained from such applications. In that case, Ranganathan (2017) stated, selection of data in research plays pivotal role as it steers the study towards success. 

On the other hand, secondary data would involve the application trend of cryptography and its benefits experienced in real life situations. In that case, case study analysis would be conducted for the current study to develop understanding regarding use of cryptography in data protection process, specifically in shared cloud system as the accessibility of such storage is higher than single server. In that case, Palinkas et al. (2015) stated that secondary analysis is safe approach as the risk of data fluctuation is quite low. However, Buchmann (2017) opined opposing the previous statement that primary analysis is more authentic in nature as the data are coming directly from the sources in terms of individual opinion and beliefs. 

In that case, maintaining proper code of conduct is also the concern of the researcher to validate the research outcomes and make it acceptable to the reader. The research will not change the data for biased purpose where all data and its interpretation will be conducted at its real means


Leave a comment


       
Captcha

Related :-