Security in Cloud Technologies: A Brief Overview

Article Preview

Abstract:

Cloud computing, a next-generation computing technique, enables extremely flexible, scalable, and cost-effective computing that is available on demand. Organizations can expect increased agility, improved business interaction, and continuity as a result of cloud technologies. However, with increased demand, the need for data confidentiality, integrity, and availability has become one of the most crucial challenges in cloud computing. Various cryptographic approaches are employed in the cloud to guarantee that these needs are met, such as safeguarding against data breaches and malicious attacks. This paper outlines cloud infrastructure, cloud security requirements, and their challenges. We then present an overview of various cryptographic techniques such as AES, DES, RSA, etc. that have been used to ensure cloud security. We also reviewed hybrid algorithms proposed and implemented by various authors and mentioned their advantages and shortcomings.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

683-695

Citation:

Online since:

February 2023

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2023 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Hussaini, Sheena and D Engineer. Cyber Security in Cloud Using Blowfish Encryption., (2020).

Google Scholar

[2] S. P. Praveen, S. Sindhura, A. Madhuri and D. A. Karras, A Novel Effective Framework for Medical Images Secure Storage Using Advanced Cipher Text Algorithm in Cloud Computing,, 2021 IEEE International Conference on Imaging Systems and Techniques (IST), 2021, pp.1-4,.

DOI: 10.1109/ist50367.2021.9651475

Google Scholar

[3] Khan, Shahin & Emdad, M. Rifat. (2019). A Standard Data Security model Using AES Algorithm in Cloud Computing. 7. 49-53. 10.26821/IJSHRE.7.5.2019.7508.

Google Scholar

[4] A. Kumar, Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing,, 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2021, pp.1529-1535,.

DOI: 10.1109/i-smac52330.2021.9640708

Google Scholar

[5] T. Nie, C. Song and X. Zhi, Performance Evaluation of DES and Blowfish Algorithms,, 2010 International Conference on Biomedical Engineering and Computer Science, 2010, pp.1-4,.

DOI: 10.1109/icbecs.2010.5462398

Google Scholar

[6] V. Verma, P. Kumar, R. K. Verma and S. Priya, A Novel Approach for Security in Cloud Data Storage Using AES-DES-RSA Hybrid Cryptography,, 2021 Emerging Trends in Industry 4.0 (ETI 4.0), 2021, pp.1-6,.

DOI: 10.1109/eti4.051663.2021.9619274

Google Scholar

[7] Singh, Gurpreet & Kinger, Supriya. (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications. 67. 33-38. 10.5120/11507-7224.

DOI: 10.5120/11507-7224

Google Scholar

[8] A. Chauhan and J. Gupta, A novel technique of cloud security based on hybrid encryption by Blowfish and MD5,, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), 2017, pp.349-355,.

DOI: 10.1109/ispcc.2017.8269702

Google Scholar

[9] V. K. Soman and V. Natarajan, An enhanced hybrid data security algorithm for cloud,, 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), 2017, pp.416-419,.

DOI: 10.1109/netact.2017.8076807

Google Scholar

[10] D. P. Timothy and A. K. Santra, A hybrid cryptography algorithm for cloud computing security,, 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 2017, pp.1-5,.

DOI: 10.1109/icmdcs.2017.8211728

Google Scholar

[11] Desai, Chitra & Pund, Shilpa(2012). Implementation of RSA algorithm using Mersenne prime.1.

Google Scholar

[12] Birendra Goswami, Dr.S.N. Singh. Enhancing Security in Cloud computing using Public Key Cryptography with Matrices., (2012).

Google Scholar

[13] S. Kumar, G. Karnani, M. S. Gaur and A. Mishra, Cloud Security using Hybrid Cryptography Algorithms,, 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021, pp.599-604,.

DOI: 10.1109/iciem51511.2021.9445377

Google Scholar

[14] I. Syafalni et al., Cloud Security Implementation using Homomorphic Encryption,, 2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat), 2020, pp.341-345,.

DOI: 10.1109/comnetsat50391.2020.9328979

Google Scholar

[15] Sohal, Manreet & Sharma, Sandeep. (2018). BDNA-A DNA Inspired Symmetric Key Cryptographic Technique to Secure Cloud Computing. Journal of King Saud University - Computer and Information Sciences. 34. 10.1016/j.jksuci.2018.09.024.

DOI: 10.1016/j.jksuci.2018.09.024

Google Scholar

[16] X. Zheng, Y. Zhang and B. Peng, Design and Implementation of a DPA Resistant AES Coprocessor,, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp.1-4,.

DOI: 10.1109/wicom.2008.1087

Google Scholar

[17] A. Behl, Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation,, 2011 World Congress on Information and Communication Technologies, 2011, pp.217-222,.

DOI: 10.1109/wict.2011.6141247

Google Scholar

[18] Tallapally, Sampath & Manjula, B.. (2020). Competent multi-level encryption methods for implementing cloud security. IOP Conference Series: Materials Science and Engineering. 981. 022039. 10.1088/1757-899X/981/2/022039.

DOI: 10.1088/1757-899x/981/2/022039

Google Scholar

[19] M. Thangapandiyan, P. M. R. Anand and K. S. Sankaran, Enhanced Cloud Security Implementation Using Modified ECC Algorithm,, 2018 International Conference on Communication and Signal Processing (ICCSP), 2018, pp.1019-1022,.

DOI: 10.1109/iccsp.2018.8524212

Google Scholar

[20] S. Singh and V. Kumar, Secured user's authentication and private data storage- access scheme in cloud computing using Elliptic curve cryptography,, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 2015, pp.791-795.

Google Scholar

[21] V. S. Mahalle and A. K. Shahade, Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm,, 2014 International Conference on Power, Automation and Communication (INPAC), 2014, pp.146-149,.

DOI: 10.1109/inpac.2014.6981152

Google Scholar

[22] D. Garg, K. K. Bhatia and S. Gupta, A novel Genetic Algorithm based Encryption Technique for Securing Data on Fog Network Using DNA Cryptography,, 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), 2022, pp.362-368,.

DOI: 10.1109/iciptm54933.2022.9754031

Google Scholar

[23] M. S. Rao, K. Venkata Rao and M. H. M. Krishna Prasad, Hybrid Security Approach for Database Security using Diffusion based cryptography and Diffie-Hellman key exchange Algorithm,, 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2021, pp.1608-1612,.

DOI: 10.1109/i-smac52330.2021.9640762

Google Scholar

[24] Sonia KOTEL and Fatma SBIAA, A Data Security Algorithm for the Cloud Computing based on Elliptic Curve Functions and Sha3 Signature, International Journal of Advanced Computer Science and Applications(IJACSA), 13(3), (2022).

DOI: 10.14569/ijacsa.2022.0130355

Google Scholar