Cryptography as a service is becoming extremely popular. It eases the way\ncompanies deal with securing their information without having to worry\nabout their customerâ??s information being accessed by someone who should\nnot have access to it. In this overview, we will be taking a closer look at Cryptography\nas a Service. The ground we will be examining is the effectiveness of\nit for mobile/wireless and desktop computing. Since we will be looking at\nsomething that operates as a service, we will need to first cover the application\nprogram interface (API) basics [1] or standard software as a service\n(SaaS) [2]. Next, what exactly cryptography as a service means for each of the\naforementioned platforms. Lastly, other possible solutions and how they\ncompare to CaaS. For the purpose of this review, we will be looking at CaaS in\na cloud environment since typical SaaS is used that way. Subsequently most\ncloud environments utilize a UNIX based operating system or similar solution,\nwhich will be the target environment for the purpose of this paper. Popular\nalgorithms that are used in CaaS will be the final part that will be examined\non the grounds of how they perform, level of security offered, and\nusability in CaaS. Upon reading this paper the reader will have a better understanding\nof how exactly CaaS operates and what it has to offer for mobile,\ndesktop, and wireless users in the present and future.
Loading....