Felix Bentil - Profile on Academia.edu (original) (raw)
Cybersecurity Professional and security researcher with interest in network and cloud security
less
Related Authors
Università degli Studi di Milano - State University of Milan (Italy)
Uploads
Papers by Felix Bentil
International journal of engineering research and technology, May 25, 2021
If all of the top levels of security fail, the final and most critical tier, data security, must ... more If all of the top levels of security fail, the final and most critical tier, data security, must not fail [1]. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined. However, increasing security reduces the performance of the system and usability. This paper addresses the fundamentals of cloud computing as well as its key challenge: security. This paper examines a variety of cryptographic methods used by major cloud providers. It proposes an alternative algorithm for encrypting data in transit from the user to the cloud in order to ensure data security and defend against Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by urging further study into the proposed cryptography algorithm in order to ensure data protection and privacy in all three data states.
Cloud Cryptography - A Security Aspect
International journal of engineering research and technology, May 25, 2021
When all the top layers of security fail, the last and most important layer which is data securit... more When all the top layers of security fail, the last and most important layer which is data security layer must not fail. Breaching this layer of security compromises the CIA triad principle of confidentiality, integrity and availability. However, increasing security also reduces the efficiency and usability of a system. This paper discusses the basics of cloud computing, and its main challenge; security. This paper's main focus is on the security challenges of cloud computing and examines various cryptographic techniques implemented by giant cloud providers and proposes an algorithm to encrypt data in transit from the user to the cloud to ensure data security to guard against data breach by Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by suggesting more works that is to be done on the proposed cryptography algorithm to ensure data security and protection in all the three various states of data.
International journal of engineering research and technology, May 25, 2021
If all of the top levels of security fail, the final and most critical tier, data security, must ... more If all of the top levels of security fail, the final and most critical tier, data security, must not fail [1]. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined. However, increasing security reduces the performance of the system and usability. This paper addresses the fundamentals of cloud computing as well as its key challenge: security. This paper examines a variety of cryptographic methods used by major cloud providers. It proposes an alternative algorithm for encrypting data in transit from the user to the cloud in order to ensure data security and defend against Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by urging further study into the proposed cryptography algorithm in order to ensure data protection and privacy in all three data states.
Cloud Cryptography - A Security Aspect
International journal of engineering research and technology, May 25, 2021
When all the top layers of security fail, the last and most important layer which is data securit... more When all the top layers of security fail, the last and most important layer which is data security layer must not fail. Breaching this layer of security compromises the CIA triad principle of confidentiality, integrity and availability. However, increasing security also reduces the efficiency and usability of a system. This paper discusses the basics of cloud computing, and its main challenge; security. This paper's main focus is on the security challenges of cloud computing and examines various cryptographic techniques implemented by giant cloud providers and proposes an algorithm to encrypt data in transit from the user to the cloud to ensure data security to guard against data breach by Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by suggesting more works that is to be done on the proposed cryptography algorithm to ensure data security and protection in all the three various states of data.