University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Artikkelit
  • Informaatioteknologian tiedekunta
  • View Item
JYX > Artikkelit > Informaatioteknologian tiedekunta > View Item

Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives

ThumbnailFinal Draft
View/Open
539.4 Kb

Downloads:  
Show download detailsHide download details  
Kronqvist, J., & Lehto, M. (2015). Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives. In N. Abouzakhar (Ed.), ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015 (pp. 151-158). Academic Conferences and Publishing International Limited. Proceedings of the European conference on cyber warfare and security. http://tinyurl.com/ECCWS2015
Published in
Proceedings of the European conference on cyber warfare and security
Authors
Kronqvist, Jyrki |
Lehto, Martti
Editors
Abouzakhar, Nasser
Date
2015
Discipline
TietotekniikkaMathematical Information Technology
Copyright
© 2015 the Authors & Academic Conferences and Publishing International Limited.

 
A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US enterprises need to reassess the risks of public cloud services provided by US companies and look for available solutions to protect their confidential data transferred and stored in the cloud. Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy, but is often challenging to implement. Encryption has its own security problems, like key management. Some cloud service providers have also announced that they are improving their security by encrypting all communications and other information flowing into their data centers. This paper will explore the common encryption solutions available on the market for enterprises to protect their confidential data transferred and stored in the cloud. In this paper we will review possible challenges enterprises may face while implementing these solutions and if these challenges play a role in the decision to use a public service. We will review also alternatives for data encryption. ...
Publisher
Academic Conferences and Publishing International Limited
ISBN
978-1-910810-28-6
Parent publication ISBN
Conference
European conference on information warfare and security
Is part of publication
ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015
ISSN Search the Publication Forum
2048-8602
Keywords
cyber espionage data encryption trustworthy confidential data public clouds salaus tietoturva pilvipalvelut luottamuksellisuus

Original source
http://academic-conferences.org/eccws/eccws2015/eccws15-proceedings.htm

URI

http://urn.fi/URN:NBN:fi:jyu-201507092559

Publication in research information system

https://converis.jyu.fi/converis/portal/detail/Publication/24782946

Metadata
Show full item record
Collections
  • Informaatioteknologian tiedekunta [1971]

Related items

Showing items with similar title or keywords.

  • Honey Encryption : implementation challenges and solutions 

    Lindholm, Ronja (2019)
    Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence mechanism was introduced against brute-force attack and this mechanism was called Honey Encryption. ...
  • Detection of distributed denial-of-service attacks in encrypted network traffic 

    Hyvärinen, Mikko (2016)
    Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita on kehitetty taistelemaan niiden kasvavaa määrää vastaan vuosien varrella. Sovelluskerroksen protokollien hyökkäykset ...
  • Effects of PSD2 on security architecture of mobile banking : a review of literature 

    Kaipainen, Lauri (2017)
    This thesis aims to find out the changes that the Payment Service Directive (PSD2) will bring to the security architecture of mobile banking. PSD2 will create a situation where security mechanisms are separated from the ...
  • Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks 

    Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti; Ojalainen, Anniina (Springer, 2020)
    Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service ...
  • Challenges in moving to cloud computing environment : case Finnish teleoperator 

    Buure, Otto (2020)
    Pilvipohjaisista palveluista on tullut erittäin suosittuja yritysten kesken. Pilvi tuo mukanaan monia hyötyjä ja mahdollisuuksia yrityksille, mutta se tuo myös epävarmuutta ja haasteita datan turvallisuuteen ja yksityisyyteen. ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre