Felix Bentil - Profile on Academia.edu (original) (raw)

Cybersecurity Professional and security researcher with interest in network and cloud security

less

Mary Jane Curry related author profile picture

David Seamon related author profile picture

Muhammad Najmi Ahmad Zabidi related author profile picture

Nikola  Milosevic related author profile picture

Viacheslav Kuleshov related author profile picture

Santiago Acosta related author profile picture

Germano Maifreda related author profile picture

Germano Maifreda

Università degli Studi di Milano - State University of Milan (Italy)

ramesh kumar ayyasamy related author profile picture

Dr. N. Jeyanthi related author profile picture

ESTEVAN GOMEZ related author profile picture

Uploads

Papers by Felix Bentil

Research paper thumbnail of Cloud Cryptography - A Security Aspect

International journal of engineering research and technology, May 25, 2021

If all of the top levels of security fail, the final and most critical tier, data security, must ... more If all of the top levels of security fail, the final and most critical tier, data security, must not fail [1]. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined. However, increasing security reduces the performance of the system and usability. This paper addresses the fundamentals of cloud computing as well as its key challenge: security. This paper examines a variety of cryptographic methods used by major cloud providers. It proposes an alternative algorithm for encrypting data in transit from the user to the cloud in order to ensure data security and defend against Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by urging further study into the proposed cryptography algorithm in order to ensure data protection and privacy in all three data states.

Research paper thumbnail of Cloud Cryptography - A Security Aspect

Cloud Cryptography - A Security Aspect

International journal of engineering research and technology, May 25, 2021

When all the top layers of security fail, the last and most important layer which is data securit... more When all the top layers of security fail, the last and most important layer which is data security layer must not fail. Breaching this layer of security compromises the CIA triad principle of confidentiality, integrity and availability. However, increasing security also reduces the efficiency and usability of a system. This paper discusses the basics of cloud computing, and its main challenge; security. This paper's main focus is on the security challenges of cloud computing and examines various cryptographic techniques implemented by giant cloud providers and proposes an algorithm to encrypt data in transit from the user to the cloud to ensure data security to guard against data breach by Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by suggesting more works that is to be done on the proposed cryptography algorithm to ensure data security and protection in all the three various states of data.

Research paper thumbnail of Cloud Cryptography - A Security Aspect

International journal of engineering research and technology, May 25, 2021

If all of the top levels of security fail, the final and most critical tier, data security, must ... more If all of the top levels of security fail, the final and most critical tier, data security, must not fail [1]. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined. However, increasing security reduces the performance of the system and usability. This paper addresses the fundamentals of cloud computing as well as its key challenge: security. This paper examines a variety of cryptographic methods used by major cloud providers. It proposes an alternative algorithm for encrypting data in transit from the user to the cloud in order to ensure data security and defend against Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by urging further study into the proposed cryptography algorithm in order to ensure data protection and privacy in all three data states.

Research paper thumbnail of Cloud Cryptography - A Security Aspect

Cloud Cryptography - A Security Aspect

International journal of engineering research and technology, May 25, 2021

When all the top layers of security fail, the last and most important layer which is data securit... more When all the top layers of security fail, the last and most important layer which is data security layer must not fail. Breaching this layer of security compromises the CIA triad principle of confidentiality, integrity and availability. However, increasing security also reduces the efficiency and usability of a system. This paper discusses the basics of cloud computing, and its main challenge; security. This paper's main focus is on the security challenges of cloud computing and examines various cryptographic techniques implemented by giant cloud providers and proposes an algorithm to encrypt data in transit from the user to the cloud to ensure data security to guard against data breach by Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by suggesting more works that is to be done on the proposed cryptography algorithm to ensure data security and protection in all the three various states of data.

Log In