umu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Cloud computing from a privacy perspective
Umeå University, Faculty of Science and Technology, Department of Computing Science.
2013 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

The cloud could simplifies the everyday life of private individuals as well as big enterprises by renting out recourses. Resources such as storage capacity, computational power or cloud-based applications could be accessed without the need to invest in expensive infrastructure. Even though many enterprises could benefit from using cloud services they hesitate, partly because they fear data leakage when storing sensitive data in the cloud environment.The goal has been to prevent unauthorized users to access the users’ data by using client-side encryption. The solution must be able to support existing features. For example many applications support multiple devices, which means that the user can access the same data from devices such as Smartphone, Tablets and desktop computers.The result showed that there are two main approaches to implement clientside encryption. The first approach bases the encryption key on random elements. It’s without a doubt the most secure method to use, but it’s not user-friendly. The user has to distribute the generated encryption key between all the devices, for example moving files back and forth. The second approach bases the encryption key on a password. The security will decrease but it will be more user friendly.It appears that the biggest problem related to client-side encryption, isn’t the encryption itself, but the distribution of encryption keys. As the number of users increase, the key destitution problem gets more distinct. Often the key distribution is handled by something called a key manager, which could operate at different levels. It could be built into the application or it could be an external application. There are organizations which made guild lines for how to design key management systems.

Place, publisher, year, edition, pages
2013.
Series
UMNAD, 968
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:umu:diva-81118OAI: oai:DiVA.org:umu-81118DiVA: diva2:652883
Educational program
Bachelor of Science Programme in Computing Science
Supervisors
Examiners
Available from: 2013-10-02 Created: 2013-10-02 Last updated: 2013-10-02Bibliographically approved

Open Access in DiVA

fulltext(441 kB)377 downloads
File information
File name FULLTEXT01.pdfFile size 441 kBChecksum SHA-512
5fa437518ccb65de3da4547f87034cb375483ad560f8e8f3f4841162edd40185486d0324b608f9359b26f78287f16434f82265fc4953786cc70d2ebf2d2a78f9
Type fulltextMimetype application/pdf

By organisation
Department of Computing Science
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 377 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 377 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf