Security Concerns of Cloud Storage

Hacker Image

Security Concerns

The shift from mostly single device storage units and large server rooms to internet Cloud data has concentrated data access and made a more data accessible for single data hijacking attacks. Companies and organizations are required to have higher security measures to protect data for their users. A kind of concentrated attack is a Denial-of-Service attack, where a malefactor denies access of the Cloud server to its intended individuals, (Rhoton, 2009). Data concentration and movement away from regulated supervision increases the risks of Data theft and leakages, and ultimately the cracking of DES security by hijackers, now considering it an outdated encryption code (Alemami et al., 2023). However, an investigation into different varieties of Cloud data encryption was done by Alemami and other researchers in a study to determine the security, data encipherment capacity, memory usage, and encipherment of various varieties. They found that Advanced Data Encryption (AES) had the highest capacity of data encryption and takes the least amount of time to encipher data. This was because of AES’s block cipher, which encrypts a large block of data protected by a symmetric key to access any block that is randomly generated by a complex algorithm that is noted to be undecipherable by a majority of brute-force methods. However, this is tough to implement for many companies and organizations because of its size and complexity and is mostly used by government institutions. Another effective encryption algorithm was Blowfish which is similar to AES in that it uses a symmetric block cipher but with a less complex algorithm and slightly smaller capacity for data encryption but is still one of the fastest algorithms and is in the public domain, making it a popular encryption model for companies and organizations.