Academic literature on the topic 'Cryptographic cloud architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographic cloud architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cryptographic cloud architecture"

1

TN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.

Full text
Abstract:
Nowadays, the massive growth of data and the adoption of the cloud-based architecture indicate that the secure storage of data is a very essential issue. Cloud storage is the solution to convenient, scalable and cost-effective storage, yet security issues persist, especially regarding the protection of sensitive information. The encryption plays a vital role in which data is made unreadable and only accessible by those with the proper authorization. This helps in data management and minimizes data leaks. Shared responsibility in cloud security entails collaboration between the operators and us
APA, Harvard, Vancouver, ISO, and other styles
2

Dr., R. Sridevi*1 &. C. B. Banupriya2. "A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 602–5. https://doi.org/10.5281/zenodo.829787.

Full text
Abstract:
The cloud computing has become a revolution in information technology, it includes elements from grid computing, utility computing and autonomic computing into a creative deployment architecture. The web service use web service to provide high performance and easy access of storage infrastructure.In this paper a survey of existing cryptographic storage techniques and benefits in cloud computing is discussed
APA, Harvard, Vancouver, ISO, and other styles
3

Karanam, Madhavi, Sahithi Reddy S, Abhinav Chakilam, and Srinu Banothu. "Performance Evaluation of Cryptographic Security Algorithms on Cloud." E3S Web of Conferences 391 (2023): 01015. http://dx.doi.org/10.1051/e3sconf/202339101015.

Full text
Abstract:
Cloud computing is a cost-effective approach to provide on demand computing and data storage solutions. Data storage is one of the key services provided by the cloud. Cloud offers improved efficiency, flexibility, and scalability, but all these advantages can be overturned if security is not taken into consideration. It is the cloud vender’s responsibility to keep the data safe with highly secure cloud services, which helps them earn the trust of the customers. Today, cloud security is critical since most organizations are already using cloud computing in alternate forms. There is always a con
APA, Harvard, Vancouver, ISO, and other styles
4

Thakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.

Full text
Abstract:
With the growing reliance on cloud computing for storing and managing data, providing security and performance for cloud storage systems has become very important and multicloud solutions offers both. Current cloud architectures suffer from scalability, security, and efficiency issues in distributed cloud systems. In this paper, we introduce a ChaCha20-encryption, a fast stream cipher and Blake3, an adaptive cryptographic hash function, and dynamic chunk allocation to an existing architecture that progressively improves data confidentiality, integrity, and redundancy. The experiment focuses on
APA, Harvard, Vancouver, ISO, and other styles
5

Hathout, Basma Badawi, Samy Ghoniemy, and Osman Ibrahim. "A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 6. http://dx.doi.org/10.3991/ijim.v11i2.6553.

Full text
Abstract:
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of sensitive data on remote machines that are not owned, or even managed by the customers themselves. In this paper, initially a homomorphic encryption-based Cryptographic Agent is proposed. The proposed Cryptographic Agent is based on Paillier scheme, and is supported by user-configurable software protection and data privacy categorization agents,
APA, Harvard, Vancouver, ISO, and other styles
6

Aiello, Samuel. "How Cryptography Can Augment Zero Trust." International Journal of Blockchain Technologies and Applications 1, no. 1 (2023): 52–60. http://dx.doi.org/10.18178/ijbta.2023.1.1.52-60.

Full text
Abstract:
The scope of this work presents the security architecture of the Cloud provider/consumer and showcases how “Cryptography” augments the Zero Trust Architecture security strategy. In addition, this work will delve into enforcing the minimum expected set of security controls that assures secure isolation, data protection, access control and monitoring/logging at all tiers of the hosted applications. Cryptographic solutions play an important role in the cloud environment in which customers hand over data to a cloud provider for storage, and processing. One of the biggest hurdles for the adoption o
APA, Harvard, Vancouver, ISO, and other styles
7

Bhuite, Prof S. S. "A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47316.

Full text
Abstract:
Abstract— This paper introduced a robust and efficient framework designed to ensure secure dynamic data handling and public auditing in cloud storage systems. The primary goal was to strengthen data integrity and user confidentiality using advanced cryptographic methods and privacy-aware third-party auditing (TPA). An in- depth analysis of existing cloud security models was conducted to uncover persistent challenges such as secure management of data updates, protection of user privacy, and reliable auditing within potentially untrusted cloud environments. To address these issues, a modular sys
APA, Harvard, Vancouver, ISO, and other styles
8

Abhale, Babasaheb Annasaheb, and Rohita Yamaganti Dr. "Mitigating cybersecurity risks in cloud computing through cryptographic protocols and service architecture." International Journal of Trends in Emerging Research and Development 2, no. 6 (2024): 153–59. https://doi.org/10.5281/zenodo.15239402.

Full text
Abstract:
The capabilities of cloud computing have moved the IT industry forward, with large enterprises migrating their processing and storage to it. One mainstream service mode for public cloud computing is Infrastructure as a Service (IaaS) public cloud. Cloud computing has several advantages when it comes to cyber-security, but one of the main ones is the heightened security measures offered by reputable CSPs Cloud computing is continuously altering how organizations store, use, and share software, workloads, and data Cloud computing is a cutting-edge technological development with huge worldwide im
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Yilin. "Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security." Applied and Computational Engineering 145, no. 1 (2025): 51–56. https://doi.org/10.54254/2755-2721/2025.21867.

Full text
Abstract:
In an era of rapid technological evolution, cloud computing has become indispensable across various industries due to its cost-efficiency, scalability, and accessibility. Yet, privacy and security concerns persist, as sensitive data can be susceptible to breaches and unauthorized access. At present, the two mainstream cloud computing architectures are centralized architecture and decentralized architecture. Both have advantages and disadvantages in terms of confidentiality, integrity and data availability. This paper employs a comparative analysis of these two architectures, synthesizing insig
APA, Harvard, Vancouver, ISO, and other styles
10

Fairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.

Full text
Abstract:
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cryptographic cloud architecture"

1

Nimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.

Full text
Abstract:
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms facilitate the construction of trustworthy secure systems; however, existing hardware security approaches require modifications to the micro-architecture of the processor and such changes are extremely time consuming and expensive to test and implement. Additionally, they incorporate cryptographic security mechanisms that are computationally intensive and account for excessive energy consumption, which significantly degrades the performance of the system. In this dissertation, I explore the dom
APA, Harvard, Vancouver, ISO, and other styles
2

Ratnayake, Yohan. "PKI based Encryption for Document Sharing, Optimized Storage, and Proof of Existence in the Cloud." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mughaid, Ala' Said Mohammad. "Modelling and simulation of a new cloud computing platform based on the SPEEDOS operating system." Thesis, 2018. http://hdl.handle.net/1959.13/1395111.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)<br>Today’s society is data-driven. Collecting data from people, actions, algorithms and the web has resulted in large data stores, and accommodating all these data has become a major challenge. ‘Big data’ tends to grow exponentially each year [1]. To handle these increasing data sizes, the concepts of shared computing, shared memory, and remote storage and access to resources have been developed. Systems such as grid computing systems, where the infrastructure combines computer resources and storage from different locations to reach a common obje
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cryptographic cloud architecture"

1

Lu, Huawei, and Hao Han. "Research on Architecture of Cryptographic Cloud Service Based on Domestic Cryptographic Technology." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-4967-9_153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qiao, Huidong, Jiangchun Ren, Zhiying Wang, Haihe Ba, Huaizhe Zhou, and Tie Hong. "OBC Based Optimization of Re-encryption for Cryptographic Cloud Storage." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49583-5_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ghule, Neeraj, Aashish Bhongade, Ashish Ranjan, Rahul Bangad, and Balaji Patil. "Intelligent Content-Based Hybrid Cryptography Architecture for Securing File Storage Over Cloud." In Proceedings of International Conference on Communication and Artificial Intelligence. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6546-9_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Limkar, Suresh, Rajas N. Bhalerao, Priya D. Shinde, and Abhishek B. Raut. "Multi-owner Architecture System Using Visual Cryptography and Watermarking for Secure Ownership in Cloud Environment." In Smart Computing and Informatics. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5547-8_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kausalye, Shekhar S., and Sanjeev Kumar Sharma. "Data Confidentiality in Cloud Storage. A Survey." In Recent Trends in Intensive Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210257.

Full text
Abstract:
In cloud computing security, privacy and data confidentiality plays important role when popularity in terms of cloud computing services is consider. Till now there are various schemes, protocols and architecture for cloud computing privacy and data protection are proposed which are based on data confidentiality, cryptographic solution, cipher text blocks, various transforms, symmetric encryption schemes, attribute-based encryption, trust and reputation, access control, etc., but they are scattered and lacking uniformity without proper security logic. This paper systematically reviews as well a
APA, Harvard, Vancouver, ISO, and other styles
6

Deng, Mina, Milan Petkovic, Marco Nalin, and Ilaria Baroni. "Home Healthcare in Cloud Computing." In Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3990-4.ch032.

Full text
Abstract:
Cloud computing is one of the emerging technologies that has an increasing impact on both private and public sectors. It represents an on-demand service model for delivering computing resources ranging from storage and data access, via computation and software provisioning. This chapter describes an application of Cloud Computing in home healthcare by introducing several use cases and application architecture based on the cloud. A comprehensive methodology is used to integrate security and privacy engineering process into the development lifecycle and to identify challenges for building securi
APA, Harvard, Vancouver, ISO, and other styles
7

Deng, Mina, Milan Petkovic, Marco Nalin, and Ilaria Baroni. "Home Healthcare in Cloud Computing." In Healthcare Administration. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6339-8.ch031.

Full text
Abstract:
Cloud computing is one of the emerging technologies that has an increasing impact on both private and public sectors. It represents an on-demand service model for delivering computing resources ranging from storage and data access, via computation and software provisioning. This chapter describes an application of Cloud Computing in home healthcare by introducing several use cases and application architecture based on the cloud. A comprehensive methodology is used to integrate security and privacy engineering process into the development lifecycle and to identify challenges for building securi
APA, Harvard, Vancouver, ISO, and other styles
8

Thakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7492-7.ch007.

Full text
Abstract:
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. Secure and reliable communications have become critical in modern computing. The centralized services like e-mail and file sharing can be changed into distributed or collaborated system through multiple systems and networks. Basic cryptographic requirements such as data confidentiality, data integrity, authentication, and access control are required to build secure collaborative systems in the broadcast channel. For several groupware applications like voice and video conferences, distributed computation o
APA, Harvard, Vancouver, ISO, and other styles
9

Thakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Encyclopedia of Information Science and Technology, Fourth Edition. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch145.

Full text
Abstract:
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. Secure and reliable communications have become critical in modern computing. The centralized services like e-mail and file sharing can be changed into distributed or collaborated system through multiple systems and networks. Basic cryptographic requirements such as data confidentiality, data integrity, authentication and access control are required to build secure collaborative system in the broadcast channel. For several groupware applications like voice &amp; video conferences, distributed computation o
APA, Harvard, Vancouver, ISO, and other styles
10

Gouru, Navya, and NagaLakshmi Vadlamani. "DistProv-Data Provenance in Distributed Cloud for Secure Transfer of Digital Assets with Ethereum Blockchain using ZKP." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch053.

Full text
Abstract:
The importance and usage of the distributed cloud is increasing rapidly over a traditionally centralized cloud for the storing and exchanging of digital assets between untrusted parties in many business sectors. Storing the digital assets in the distributed cloud is considered superior to traditional cloud computing in terms of environmentally friendly, cost, security and other technical dimensions. In this article, a contemporary architecture DistProv is proposed where an open source distributed cloud IPFS is used to store and transfer the digital assets between the consignor and consignee. T
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cryptographic cloud architecture"

1

Yuvarani, R., and R. Mahaveerakannan. "Expert in Payment Security and IoT Cloud Architecture for Banking, Specializing in Cryptographic Techniques." In 2025 8th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2025. https://doi.org/10.1109/icoei65986.2025.11013769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Shuwen, and George C. Polyzos. "SovereignEdge: A Context-Aware Cryptographic Architecture for Data Sovereignty in Mobile Edge–Fog–Cloud IoT Data Spaces." In 2025 8th World Conference on Computing and Communication Technologies (WCCCT). IEEE, 2025. https://doi.org/10.1109/wccct65447.2025.11027965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wani, Abdul Raoof, Q. P. Rana, and Nitin Pandey. "Cloud security architecture based on user authentication and symmetric key cryptographic techniques." In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2017. http://dx.doi.org/10.1109/icrito.2017.8342485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-to-Cloud) and V2X(Vehicle-to-Everything). This has pushed classical automotive system in background and vehicle components are now increasingly dominated by software’s. Now more focus is made on to increase self-decision-making capabilities of a
APA, Harvard, Vancouver, ISO, and other styles
5

Storch, Mauro, Vinícius Meyer, Avelino Zorzo, and Cesar A. F. De Rose. "A Modular Architecture and a Cost-Model to Estimate the Overhead of Implementing Confidentiality in Cloud Computing Environments." In Simpósio em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/sscad.2024.244780.

Full text
Abstract:
Cloud computing has become increasingly popular among organizations. As a result, security has become a major concern in the adoption of cloud computing environments. To ensure confidentiality and prevent data leakage, organizations have adopted various security measures, including sophisticated authentication methods and strong cryptography algorithms. However, implementing these measures generates additional overhead that could impact resource consumption and performance at user level. This paper proposes a modular architecture for a full-stack confidentiality cloud and a model to estimate i
APA, Harvard, Vancouver, ISO, and other styles
6

Hayward, Ryan, and Chia-Chu Chiang. "An Architecture for Parallelizing Fully Homomorphic Cryptography on Cloud." In 2013 7th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS). IEEE, 2013. http://dx.doi.org/10.1109/cisis.2013.139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bouzerna, Nabil, Renaud Sirdey, Oana Stan, Thanh Hai Nguyen, and Philippe Wolf. "An Architecture for Practical Confidentiality-Strengthened Face Authentication Embedding Homomorphic Cryptography." In 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2016. http://dx.doi.org/10.1109/cloudcom.2016.0069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Chen, Tengyan Wang, Chuan He, and Yong Li. "Software-define cloud-edge collaborative defense architecture against unknown attacks." In CNSCT 2024: 2024 3rd International Conference on Cryptography, Network Security and Communication Technology. ACM, 2024. http://dx.doi.org/10.1145/3673277.3673280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Berlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. ACM, 2020. http://dx.doi.org/10.1145/3320269.3384767.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cryptographic cloud architecture"

1

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Full text
Abstract:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!