Volume 5

V5 N3 Pages 24-30

July 2012


Using the Cloud: Keeping Enterprise Data Private


Kyle Cronin
Dakota State University
Madison, SD 57042, USA

Wayne E Pauli
Dakota State University
Madison, SD 57042, USA

Michael Ham
Dakota State University
Madison, SD 57042, USA

Abstract: Cloud computing has overwhelmed the computing industry over the past few years. Exciting pro-spects such as sharing resources, reducing costs, and increasing efficiency have made the cloud computing model highly attractive. In this paper, we will focus briefly on the privacy and security concerns of outsourcing the hosting of a virtual infrastructure, often referred to as Infrastructure as a Service. Also, we will analyze two different methods of encrypting data and the performance degradation that is caused by leveraging encryption in an effort to prevent a cloud provider from accessing your information. Then, we will compare the results of a simulated SQL server and have a basic conclusion of what method offers better performance, and a basic analysis of the degradation of performance caused by encrypting data in a particular cloud computing setting.

Keywords: Cloud Computing, encryption, hypervisor, time based tradeoff, infrastructure as a service, Software as a Service (SaaS)

Download this article: JISAR - V5 N3 Page 24.pdf


Recommended Citation: Cronin, K., Pauli, W. E., Ham, M. (2012). Using the cloud: How to keep your data private. Journal of Information Systems Applied Research, 5(3) pp 24-30. http://jisar.org/2012-5/ ISSN: 1946-1836. (A preliminary version appears in The Proceedings of CONISAR 2011)