Open Access Open Access  Restricted Access Subscription Access

Cloud Security investigation using Cryptography and Crypto Analysis Approaches

Mahesh B.

Abstract


Cloud computing is now a highly appealing, enticing, and intriguing technology that provides users with on-demand service via the internet. It is processed to increase cloud storage capacity and capability without spending money on training or the environment. The more abstraction that is utilized for development in a cloud environment is cloud computing, which stores data in a cloud server with data security. There are a lot of people who use cloud storage to store their own data, so cloud storage needs to be secure. The main issue with cloud computing is security when uploading and downloading data from a cloud server. We had to discuss a variety of cryptographic algorithmic approaches used in the literature to address cloud data security concerns in this paper. For security reasons, we organized a systematic review of symmetric key and asymmetric key algorithms here, with a focus on hybrid cryptography algorithms. Data encryption, cloud-based applications, and services use these algorithms.


Full Text:

PDF

References


Bhardwaj, A., Subrahmanyam, G. V. B., Avasthi, V., & Sastry, H. (2016). Security algorithms for cloud computing. Procedia Computer Science, 85, 535-542.

Deshmukh, A., Janda, H. K., & Bhusari, S. (2015). Security on cloud using Cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 5(3).

Chatterjee, R., Roy, S., & Scholar, U. G. (2017). Cryptography in cloud computing: a basic approach to ensure security in cloud. International Journal of Engineering Science, 11818.

Saleh, M. E., Aly, A. A., & Omara, F. A. (2016). Data security using cryptography and steganography techniques. International Journal of Advanced Computer Science and Applications, 7(6).

Ahmad, S. A., & Garko, A. B. (2019, December). Hybrid cryptography algorithms in cloud computing: A review. In 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) (pp. 1-6). IEEE.

Srivastava, P., & Khan, R. (2018). A review paper on cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), 17-20.

Yong, P. E. N. G., Wei, Z. H. A. O., Feng, X. I. E., DAI, Z. H., Yang, G. A. O., & CHEN, D. Q. (2012). Secure cloud storage based on cryptographic techniques. The Journal of China Universities of Posts and Telecommunications, 19, 182-189.


Refbacks

  • There are currently no refbacks.