DATA ENCRYPTION TECHNIQUES FOR SECURING CLOUD STORAGE AND COMMUNICATION

Authors

  • Ravindrakumar Assistant Professor, Department of Computer Science, Government First Grade College Chitaguppa.

DOI:

https://doi.org/10.29121/shodhkosh.v5.i4.2024.3360

Keywords:

Data Encryption, Cloud Security, Symmetric Encryption, Asymmetric Encryption, Homomorphic Encryption, Key Management, Quantum-Resistant Cryptography

Abstract [English]

Because of the fast use of cloud computing, effective security measures have become necessary in order to safeguard sensitive data from being accessed by unauthorised parties and from being compromised. The encryption of data is an essential component of cloud security, since it guarantees the confidentiality and integrity of data while it is being stored and sent. Within the scope of this work, a number of distinct encryption methods, including as symmetric key encryption, asymmetric key encryption, and homomorphic encryption, are investigated. The advantages, limits, and appropriateness of these encryption approaches for various cloud settings are discussed. A strong emphasis is placed on the role that encryption plays in maintaining regulatory compliance, minimising risks associated with eavesdropping, and safeguarding communications from beginning to finish. In addition, we investigate hybrid encryption strategies, which combine the advantages of symmetric and asymmetric systems in order to strike a balance between efficiency and security. Another topic that is covered is the difficulties associated with key management, performance overhead, and interaction with the cloud infrastructure that is already in place. The use of encryption frameworks to protect cloud storage and communication in areas such as healthcare, banking, and e-commerce is demonstrated through case studies that are based on real-world scenarios. In the future, there is the possibility of developing encryption that is resistant to quantum computing in order to combat the dangers that are posed by quantum computing. The purpose of this study is to provide organisations with a guidance that can assist them in improving their cloud security postures by utilising modern encryption technology.

References

K. R. Dayana and P. S. Rani, "Secure cloud data storage solution with better data accessibility and time efficiency," Journal for Control, Measurement, Electronics, Computing and Communications, vol. 64, no. 4, pp. 756-763, 2023. DOI: https://doi.org/10.1080/00051144.2023.2213564

A. Reyana, S. Kautish, K. Mohiuddin, F. K. Karim, H. Elmannai, S. Ghorashi and Y. Hamid, "Enhanced cloud storage encryption standard for security in distributed environments," Electronics, vol. 12, no. 3, 2023. DOI: https://doi.org/10.3390/electronics12030714

J. Hassan, D. Shehzad, U. Habib, M. U. Aftab, M. Ahmad, R. Kuleev and M. Mazzara, "The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)," Computational Intelligence and Neuroscience, 2022. DOI: https://doi.org/10.1155/2022/8303504

P. Yang, N. Xiong and J. Ren, "Data security and privacy protection for cloud storage: A survey," IEEE Access, vol. 8, pp. 31723-131740, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3009876

M. A. Al-Shabi, "A survey on symmetric and asymmetric cryptography," International Journal of Scientific and Research Publications,, vol. 9, no. 3, 2019. DOI: https://doi.org/10.29322/IJSRP.9.03.2019.p8779

L. Munn, T. Hristova and L. Magee, "Clouded data: Privacy and the promise of encryption," Big Data & Society, vol. 6, no. 1, 2019. DOI: https://doi.org/10.1177/2053951719848781

E. Gelenbe, P. C. Czachorski, S. K. Katsikas, I. Komnios, L. Romano and D. Tzovaras, Security in computer and information sciences, Spriger Open, 2018. DOI: https://doi.org/10.1007/978-3-319-95189-8

B. White, D. Andre, G. Arquero, R. Bajaj, J. Cronin, A. Dames, H. Lyksborg, A. Miranda and M. Weiss, Transitioning to quantum-safe cryptography on IBM Z, International Business Machines Corporation, 2022.

B. Dufrasne, R. Fridii and A. Greenfield, Data-at-rest encryption for the IBM spectrum accelerate family, International Business Machines Corporation, 2019.

H. Kolivand, S. F. Hamood, S. Asadianfam and M. S. Rahim, "Image encryption techniques: A comprehensive review," Multimedia Tools and Applications, 2024. DOI: https://doi.org/10.1007/s11042-023-17896-0

Mante, R.V.; Bajad, N.R. A study of searchable and auditable attribute based encryption in cloud. In Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 10–12 June 2020; IEEE: Piscataway, NJ, USA, 2021; pp. 1411–1415. DOI: https://doi.org/10.1109/ICCES48766.2020.9137860

Vennala, A.; Radha, M.; Rohini, M.; Anees Fathima, M.; Lakshmi, P.D. Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage. J. Eng. Sci. 2022, 13, 532–541.

Li, R.; Yang, H.; Wang, X.A.; Yi, Z.; Niu, K. Improved Public Auditing System of Cloud Storage Based on BLS Signature. Secur. Commun. Netw. 2022, 2022, 6800216. DOI: https://doi.org/10.1155/2022/6800216

He, J.; Zhang, Z.; Li, M.; Zhu, L.; Hu, J. Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access 2018, 7, 6226–6239. DOI: https://doi.org/10.1109/ACCESS.2018.2889296

Rathore, H.; Mohamed, A.; Guizani, M. A survey of blockchain-enabled cyber-physical systems. Sensors 2020, 20, 282. DOI: https://doi.org/10.3390/s20010282

Chen, Y.; Liu, H.; Wang, B.; Sonompil, B.; Ping, Y.; Zhang, Z. A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 2021, 10, 3. DOI: https://doi.org/10.1186/s13677-020-00222-6

Sajay, K.R.; Babu, S.S.; Vijayalakshmi, Y. Enhancing the security of cloud data using hybrid encryption algorithm. J. Ambient Intell. Humaniz. Comput. 2019, 1–10. DOI: https://doi.org/10.1007/s12652-019-01403-1

Latha, K.; Sheela, T. Block based data security and data distribution on multi cloud environment. J. Ambient Intell. Humaniz. Comput. 2019, 1–7. DOI: https://doi.org/10.1007/s12652-019-01395-y

Cha, J.; Singh, S.K.; Kim, T.W.; Park, J.H. Blockchain-empowered cloud architecture based on secret sharing for smart city. J. Inf. Secur. Appl. 2021, 57, 102686. DOI: https://doi.org/10.1016/j.jisa.2020.102686

Viswanath, G.; Krishna, P.V. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol. Intell. 2021, 14, 691–698. DOI: https://doi.org/10.1007/s12065-020-00404-w

Xu, Y.; Ding, L.; Cui, J.; Zhong, H.; Yu, J. PP-CSA: A privacy-preserving cloud storage auditing scheme for data sharing. IEEE Syst. J. 2020, 15, 3730–3739. DOI: https://doi.org/10.1109/JSYST.2020.3018692

Downloads

Published

2024-04-30

How to Cite

Ravindrakumar. (2024). DATA ENCRYPTION TECHNIQUES FOR SECURING CLOUD STORAGE AND COMMUNICATION. ShodhKosh: Journal of Visual and Performing Arts, 5(4), 861–869. https://doi.org/10.29121/shodhkosh.v5.i4.2024.3360