DATA ENCRYPTION TECHNIQUES FOR SECURING CLOUD STORAGE AND COMMUNICATION
DOI:
https://doi.org/10.29121/shodhkosh.v5.i4.2024.3360Keywords:
Data Encryption, Cloud Security, Symmetric Encryption, Asymmetric Encryption, Homomorphic Encryption, Key Management, Quantum-Resistant CryptographyAbstract [English]
Because of the fast use of cloud computing, effective security measures have become necessary in order to safeguard sensitive data from being accessed by unauthorised parties and from being compromised. The encryption of data is an essential component of cloud security, since it guarantees the confidentiality and integrity of data while it is being stored and sent. Within the scope of this work, a number of distinct encryption methods, including as symmetric key encryption, asymmetric key encryption, and homomorphic encryption, are investigated. The advantages, limits, and appropriateness of these encryption approaches for various cloud settings are discussed. A strong emphasis is placed on the role that encryption plays in maintaining regulatory compliance, minimising risks associated with eavesdropping, and safeguarding communications from beginning to finish. In addition, we investigate hybrid encryption strategies, which combine the advantages of symmetric and asymmetric systems in order to strike a balance between efficiency and security. Another topic that is covered is the difficulties associated with key management, performance overhead, and interaction with the cloud infrastructure that is already in place. The use of encryption frameworks to protect cloud storage and communication in areas such as healthcare, banking, and e-commerce is demonstrated through case studies that are based on real-world scenarios. In the future, there is the possibility of developing encryption that is resistant to quantum computing in order to combat the dangers that are posed by quantum computing. The purpose of this study is to provide organisations with a guidance that can assist them in improving their cloud security postures by utilising modern encryption technology.
References
K. R. Dayana and P. S. Rani, "Secure cloud data storage solution with better data accessibility and time efficiency," Journal for Control, Measurement, Electronics, Computing and Communications, vol. 64, no. 4, pp. 756-763, 2023. DOI: https://doi.org/10.1080/00051144.2023.2213564
A. Reyana, S. Kautish, K. Mohiuddin, F. K. Karim, H. Elmannai, S. Ghorashi and Y. Hamid, "Enhanced cloud storage encryption standard for security in distributed environments," Electronics, vol. 12, no. 3, 2023. DOI: https://doi.org/10.3390/electronics12030714
J. Hassan, D. Shehzad, U. Habib, M. U. Aftab, M. Ahmad, R. Kuleev and M. Mazzara, "The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)," Computational Intelligence and Neuroscience, 2022. DOI: https://doi.org/10.1155/2022/8303504
P. Yang, N. Xiong and J. Ren, "Data security and privacy protection for cloud storage: A survey," IEEE Access, vol. 8, pp. 31723-131740, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3009876
M. A. Al-Shabi, "A survey on symmetric and asymmetric cryptography," International Journal of Scientific and Research Publications,, vol. 9, no. 3, 2019. DOI: https://doi.org/10.29322/IJSRP.9.03.2019.p8779
L. Munn, T. Hristova and L. Magee, "Clouded data: Privacy and the promise of encryption," Big Data & Society, vol. 6, no. 1, 2019. DOI: https://doi.org/10.1177/2053951719848781
E. Gelenbe, P. C. Czachorski, S. K. Katsikas, I. Komnios, L. Romano and D. Tzovaras, Security in computer and information sciences, Spriger Open, 2018. DOI: https://doi.org/10.1007/978-3-319-95189-8
B. White, D. Andre, G. Arquero, R. Bajaj, J. Cronin, A. Dames, H. Lyksborg, A. Miranda and M. Weiss, Transitioning to quantum-safe cryptography on IBM Z, International Business Machines Corporation, 2022.
B. Dufrasne, R. Fridii and A. Greenfield, Data-at-rest encryption for the IBM spectrum accelerate family, International Business Machines Corporation, 2019.
H. Kolivand, S. F. Hamood, S. Asadianfam and M. S. Rahim, "Image encryption techniques: A comprehensive review," Multimedia Tools and Applications, 2024. DOI: https://doi.org/10.1007/s11042-023-17896-0
Mante, R.V.; Bajad, N.R. A study of searchable and auditable attribute based encryption in cloud. In Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 10–12 June 2020; IEEE: Piscataway, NJ, USA, 2021; pp. 1411–1415. DOI: https://doi.org/10.1109/ICCES48766.2020.9137860
Vennala, A.; Radha, M.; Rohini, M.; Anees Fathima, M.; Lakshmi, P.D. Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage. J. Eng. Sci. 2022, 13, 532–541.
Li, R.; Yang, H.; Wang, X.A.; Yi, Z.; Niu, K. Improved Public Auditing System of Cloud Storage Based on BLS Signature. Secur. Commun. Netw. 2022, 2022, 6800216. DOI: https://doi.org/10.1155/2022/6800216
He, J.; Zhang, Z.; Li, M.; Zhu, L.; Hu, J. Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access 2018, 7, 6226–6239. DOI: https://doi.org/10.1109/ACCESS.2018.2889296
Rathore, H.; Mohamed, A.; Guizani, M. A survey of blockchain-enabled cyber-physical systems. Sensors 2020, 20, 282. DOI: https://doi.org/10.3390/s20010282
Chen, Y.; Liu, H.; Wang, B.; Sonompil, B.; Ping, Y.; Zhang, Z. A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 2021, 10, 3. DOI: https://doi.org/10.1186/s13677-020-00222-6
Sajay, K.R.; Babu, S.S.; Vijayalakshmi, Y. Enhancing the security of cloud data using hybrid encryption algorithm. J. Ambient Intell. Humaniz. Comput. 2019, 1–10. DOI: https://doi.org/10.1007/s12652-019-01403-1
Latha, K.; Sheela, T. Block based data security and data distribution on multi cloud environment. J. Ambient Intell. Humaniz. Comput. 2019, 1–7. DOI: https://doi.org/10.1007/s12652-019-01395-y
Cha, J.; Singh, S.K.; Kim, T.W.; Park, J.H. Blockchain-empowered cloud architecture based on secret sharing for smart city. J. Inf. Secur. Appl. 2021, 57, 102686. DOI: https://doi.org/10.1016/j.jisa.2020.102686
Viswanath, G.; Krishna, P.V. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol. Intell. 2021, 14, 691–698. DOI: https://doi.org/10.1007/s12065-020-00404-w
Xu, Y.; Ding, L.; Cui, J.; Zhong, H.; Yu, J. PP-CSA: A privacy-preserving cloud storage auditing scheme for data sharing. IEEE Syst. J. 2020, 15, 3730–3739. DOI: https://doi.org/10.1109/JSYST.2020.3018692
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Ravindrakumar

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.