Change search
ReferencesLink to record
Permanent link

Direct link
Cloud computing from a privacy perspective
Umeå University, Faculty of Science and Technology, Department of Computing Science.
2013 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

The cloud could simplifies the everyday life of private individuals as well as big enterprises by renting out recourses. Resources such as storage capacity, computational power or cloud-based applications could be accessed without the need to invest in expensive infrastructure. Even though many enterprises could benefit from using cloud services they hesitate, partly because they fear data leakage when storing sensitive data in the cloud environment.The goal has been to prevent unauthorized users to access the users’ data by using client-side encryption. The solution must be able to support existing features. For example many applications support multiple devices, which means that the user can access the same data from devices such as Smartphone, Tablets and desktop computers.The result showed that there are two main approaches to implement clientside encryption. The first approach bases the encryption key on random elements. It’s without a doubt the most secure method to use, but it’s not user-friendly. The user has to distribute the generated encryption key between all the devices, for example moving files back and forth. The second approach bases the encryption key on a password. The security will decrease but it will be more user friendly.It appears that the biggest problem related to client-side encryption, isn’t the encryption itself, but the distribution of encryption keys. As the number of users increase, the key destitution problem gets more distinct. Often the key distribution is handled by something called a key manager, which could operate at different levels. It could be built into the application or it could be an external application. There are organizations which made guild lines for how to design key management systems.

Place, publisher, year, edition, pages
, UMNAD, 968
National Category
Engineering and Technology
URN: urn:nbn:se:umu:diva-81118OAI: diva2:652883
Educational program
Bachelor of Science Programme in Computing Science
Available from: 2013-10-02 Created: 2013-10-02 Last updated: 2013-10-02Bibliographically approved

Open Access in DiVA

fulltext(441 kB)336 downloads
File information
File name FULLTEXT01.pdfFile size 441 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
Department of Computing Science
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 336 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 332 hits
ReferencesLink to record
Permanent link

Direct link