Academic literature on the topic 'Cryptographic cloud architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographic cloud architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptographic cloud architecture"
TN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.
Full textDr., R. Sridevi*1 &. C. B. Banupriya2. "A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 602–5. https://doi.org/10.5281/zenodo.829787.
Full textKaranam, Madhavi, Sahithi Reddy S, Abhinav Chakilam, and Srinu Banothu. "Performance Evaluation of Cryptographic Security Algorithms on Cloud." E3S Web of Conferences 391 (2023): 01015. http://dx.doi.org/10.1051/e3sconf/202339101015.
Full textThakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.
Full textHathout, Basma Badawi, Samy Ghoniemy, and Osman Ibrahim. "A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 6. http://dx.doi.org/10.3991/ijim.v11i2.6553.
Full textAiello, Samuel. "How Cryptography Can Augment Zero Trust." International Journal of Blockchain Technologies and Applications 1, no. 1 (2023): 52–60. http://dx.doi.org/10.18178/ijbta.2023.1.1.52-60.
Full textBhuite, Prof S. S. "A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47316.
Full textAbhale, Babasaheb Annasaheb, and Rohita Yamaganti Dr. "Mitigating cybersecurity risks in cloud computing through cryptographic protocols and service architecture." International Journal of Trends in Emerging Research and Development 2, no. 6 (2024): 153–59. https://doi.org/10.5281/zenodo.15239402.
Full textChen, Yilin. "Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security." Applied and Computational Engineering 145, no. 1 (2025): 51–56. https://doi.org/10.54254/2755-2721/2025.21867.
Full textFairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.
Full textDissertations / Theses on the topic "Cryptographic cloud architecture"
Nimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.
Full textRatnayake, Yohan. "PKI based Encryption for Document Sharing, Optimized Storage, and Proof of Existence in the Cloud." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182906.
Full textMughaid, Ala' Said Mohammad. "Modelling and simulation of a new cloud computing platform based on the SPEEDOS operating system." Thesis, 2018. http://hdl.handle.net/1959.13/1395111.
Full textBook chapters on the topic "Cryptographic cloud architecture"
Lu, Huawei, and Hao Han. "Research on Architecture of Cryptographic Cloud Service Based on Domestic Cryptographic Technology." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-4967-9_153.
Full textQiao, Huidong, Jiangchun Ren, Zhiying Wang, Haihe Ba, Huaizhe Zhou, and Tie Hong. "OBC Based Optimization of Re-encryption for Cryptographic Cloud Storage." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49583-5_46.
Full textGhule, Neeraj, Aashish Bhongade, Ashish Ranjan, Rahul Bangad, and Balaji Patil. "Intelligent Content-Based Hybrid Cryptography Architecture for Securing File Storage Over Cloud." In Proceedings of International Conference on Communication and Artificial Intelligence. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6546-9_36.
Full textLimkar, Suresh, Rajas N. Bhalerao, Priya D. Shinde, and Abhishek B. Raut. "Multi-owner Architecture System Using Visual Cryptography and Watermarking for Secure Ownership in Cloud Environment." In Smart Computing and Informatics. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5547-8_61.
Full textKausalye, Shekhar S., and Sanjeev Kumar Sharma. "Data Confidentiality in Cloud Storage. A Survey." In Recent Trends in Intensive Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210257.
Full textDeng, Mina, Milan Petkovic, Marco Nalin, and Ilaria Baroni. "Home Healthcare in Cloud Computing." In Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3990-4.ch032.
Full textDeng, Mina, Milan Petkovic, Marco Nalin, and Ilaria Baroni. "Home Healthcare in Cloud Computing." In Healthcare Administration. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6339-8.ch031.
Full textThakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7492-7.ch007.
Full textThakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Encyclopedia of Information Science and Technology, Fourth Edition. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch145.
Full textGouru, Navya, and NagaLakshmi Vadlamani. "DistProv-Data Provenance in Distributed Cloud for Secure Transfer of Digital Assets with Ethereum Blockchain using ZKP." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch053.
Full textConference papers on the topic "Cryptographic cloud architecture"
Yuvarani, R., and R. Mahaveerakannan. "Expert in Payment Security and IoT Cloud Architecture for Banking, Specializing in Cryptographic Techniques." In 2025 8th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2025. https://doi.org/10.1109/icoei65986.2025.11013769.
Full textLiu, Shuwen, and George C. Polyzos. "SovereignEdge: A Context-Aware Cryptographic Architecture for Data Sovereignty in Mobile Edge–Fog–Cloud IoT Data Spaces." In 2025 8th World Conference on Computing and Communication Technologies (WCCCT). IEEE, 2025. https://doi.org/10.1109/wccct65447.2025.11027965.
Full textWani, Abdul Raoof, Q. P. Rana, and Nitin Pandey. "Cloud security architecture based on user authentication and symmetric key cryptographic techniques." In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2017. http://dx.doi.org/10.1109/icrito.2017.8342485.
Full textKumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.
Full textStorch, Mauro, Vinícius Meyer, Avelino Zorzo, and Cesar A. F. De Rose. "A Modular Architecture and a Cost-Model to Estimate the Overhead of Implementing Confidentiality in Cloud Computing Environments." In Simpósio em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/sscad.2024.244780.
Full textHayward, Ryan, and Chia-Chu Chiang. "An Architecture for Parallelizing Fully Homomorphic Cryptography on Cloud." In 2013 7th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS). IEEE, 2013. http://dx.doi.org/10.1109/cisis.2013.139.
Full textBouzerna, Nabil, Renaud Sirdey, Oana Stan, Thanh Hai Nguyen, and Philippe Wolf. "An Architecture for Practical Confidentiality-Strengthened Face Authentication Embedding Homomorphic Cryptography." In 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2016. http://dx.doi.org/10.1109/cloudcom.2016.0069.
Full textWang, Chen, Tengyan Wang, Chuan He, and Yong Li. "Software-define cloud-edge collaborative defense architecture against unknown attacks." In CNSCT 2024: 2024 3rd International Conference on Cryptography, Network Security and Communication Technology. ACM, 2024. http://dx.doi.org/10.1145/3673277.3673280.
Full textBerlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. ACM, 2020. http://dx.doi.org/10.1145/3320269.3384767.
Full textReports on the topic "Cryptographic cloud architecture"
Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full text