

THE EVOLVING CLOUD SECURITY LANDSCAPE: CHALLENGES AND SOLUTIONS
Abstract
Cloud Computing has emerged as a pivotal technology in the IT industry over recent years. Its widespread adoption can be attributed to the significant economic benefits it offers. Numerous Cloud Service Providers (CSPs) now enable users to host their applications and data on cloud platforms. However, a major challenge persists in the form of Cloud Security, which hinders the full- scale adoption and utilization of cloud services. This issue continues to prevent many users from taking advantage of the diverse services cloud computing offers.
To address these concerns, various mechanisms have been developed to mitigate potential risks under the umbrella of cloud security. In this paper, we propose a Hybrid Cryptographic System (HCS), which combines the strengths of both symmetric and asymmetric encryption techniques to create a secure cloud environment. The study focuses on designing a robust cloud ecosystem that integrates multi-factor authentication and incorporates multiple layers of hashing and encryption to enhance security. The proposed system and algorithms are implemented using the CloudSim simulator. The paper also demonstrates the functionality of the system and presents the results obtained from the simulations, showcasing how the proposed solution ensures data security and privacy within the cloud ecosystem.
References
Kandukuri, Balachandra Reddy, and Atanu Rakshit. "Cloud security issues." 2009 IEEE international conference on services computing. IEEE, 2009.
Krutz, Ronald L., Ronald L. Krutz, and Russell Dean Vines Russell Dean Vines. Cloud security a comprehensive guide to secure cloud computing. Wiley, 2010.
Chirra, Bharadwaja Reddy. "Enhancing Cloud Security through Quantum Cryptography for Robust Data Transmission." Revista de Inteligencia Artificial en Medicina 15.1 (2024): 752-775.
Jimmy, F. N. U. "Cloud security posture management: tools and techniques." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.3 (2023).
Nassif, Ali Bou, et al. "Machine learning for cloud security: a systematic review." IEEE Access 9 (2021): 20717-20735.
Butt, Umer Ahmed, et al. "Cloud security threats and solutions: A survey." Wireless Personal Communications 128.1 (2023): 387-
Singh, Ashish, and Kakali Chatterjee. "Cloud security issues and challenges: A survey." Journal of Network and Computer Applications 79 (2017): 88-115.
Singh, Vaishali, and S. K. Pandey. "A comparative study of cloud security ontologies." Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization. IEEE, 2014.
Deepak, N.R., Balaji, S. (2016). Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol465.Springer,Cham.https://doi.org/10.1007/97 8-3-319-33622-0_10
Simran Pal R and Deepak N R, “Evaluation on Mitigating Cyber Attacks and Securing Sensitive Information with the Adaptive Secure Metaverse Guard (ASMG) Algorithm Using Decentralized Security”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 656–667, Sep.
Refbacks
- There are currently no refbacks.