Journal articles on the topic 'Cryptographic cloud architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptographic cloud architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
TN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.
Full textDr., R. Sridevi*1 &. C. B. Banupriya2. "A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 602–5. https://doi.org/10.5281/zenodo.829787.
Full textKaranam, Madhavi, Sahithi Reddy S, Abhinav Chakilam, and Srinu Banothu. "Performance Evaluation of Cryptographic Security Algorithms on Cloud." E3S Web of Conferences 391 (2023): 01015. http://dx.doi.org/10.1051/e3sconf/202339101015.
Full textThakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.
Full textHathout, Basma Badawi, Samy Ghoniemy, and Osman Ibrahim. "A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 6. http://dx.doi.org/10.3991/ijim.v11i2.6553.
Full textAiello, Samuel. "How Cryptography Can Augment Zero Trust." International Journal of Blockchain Technologies and Applications 1, no. 1 (2023): 52–60. http://dx.doi.org/10.18178/ijbta.2023.1.1.52-60.
Full textBhuite, Prof S. S. "A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47316.
Full textAbhale, Babasaheb Annasaheb, and Rohita Yamaganti Dr. "Mitigating cybersecurity risks in cloud computing through cryptographic protocols and service architecture." International Journal of Trends in Emerging Research and Development 2, no. 6 (2024): 153–59. https://doi.org/10.5281/zenodo.15239402.
Full textChen, Yilin. "Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security." Applied and Computational Engineering 145, no. 1 (2025): 51–56. https://doi.org/10.54254/2755-2721/2025.21867.
Full textFairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.
Full textGaurav, Raj1 and Kamaljit Kaur2. "Secure Cloud Communication for Effective Cost Management System through MSBE." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, June (2018): 01–12. https://doi.org/10.5281/zenodo.1440834.
Full textBadr, Aymen Mudheher, Yi Zhang, and Hafiz Gulfam Ahmad Umar. "Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing." Electronics 8, no. 2 (2019): 171. http://dx.doi.org/10.3390/electronics8020171.
Full textMohammad Asad Hussain. "Blockchain for secure data integration in multi-cloud and hybrid cloud systems." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 743–53. https://doi.org/10.30574/wjarr.2025.26.2.1658.
Full textArunkumar, R. Josephius, and R. Anbuselvi. "An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 239. http://dx.doi.org/10.23956/ijarcsse.v7i8.57.
Full textLin, Han-Yu, and Yan-Ru Jiang. "A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System." Applied Sciences 11, no. 1 (2020): 63. http://dx.doi.org/10.3390/app11010063.
Full textMuneera, M. Nafees, G. Anbu Selvi, V. Vaissnave, and Gopal Lal Rajora. "A Cryptographic based I2ADO-DNN Security Framework for Intrusion Detection in Cloud Systems." International Journal of Computer Network and Information Security 15, no. 6 (2023): 40–51. http://dx.doi.org/10.5815/ijcnis.2023.06.04.
Full textShamshad, Shuhab, Farina Riaz, Rabia Riaz, Sanam Shahla Rizvi, and Shahab Abdulla. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors 22, no. 21 (2022): 8151. http://dx.doi.org/10.3390/s22218151.
Full textNeethu V A. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 327–37. https://doi.org/10.52783/jisem.v10i16s.2599.
Full textNeethu V A, Arun Vaishnav, Mohammad Akram Khan. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 52–62. https://doi.org/10.52783/jisem.v10i16s.2559.
Full textVani, K. H., and Dr P. Balamurugan. "Comparative Analysis of Trust-Based Data Storage Management Techniques in Dynamic Cloud Service." International Journal of Basic and Applied Sciences 14, no. 3 (2025): 258–65. https://doi.org/10.14419/vbn70d23.
Full textVijai, Anand Ramar, and Kumar R. Veerandra. "ENHANCING DATA PRIVACY AND SECURITY IN CLOUD HEALTHCARE SOLUTIONS USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC)." International Journal Of Engineering Technology Research & Management (IJETRM) 03, no. 05 (2019): 133–43. https://doi.org/10.5281/zenodo.15600580.
Full textprasanna,, G. Laxmi. "PRIVACY PRESERVING DATA SHARING CLOUD-BASED HEALTHCARE SYSTEMS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40474.
Full textV Uday Kumar and Kaila Shahu Chatrapati. "Hybrid Hash Trees in Blockchain: Evaluating Algorithm Combinations for Speed and Security." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 3 (2025): 1356–66. https://doi.org/10.32628/ijsrset2512181.
Full textGouru, Navya, and NagaLakshmi Vadlamani. "DistProv-Data Provenance in Distributed Cloud for Secure Transfer of Digital Assets with Ethereum Blockchain using ZKP." International Journal of Open Source Software and Processes 10, no. 3 (2019): 1–18. http://dx.doi.org/10.4018/ijossp.2019070101.
Full textYakoob, S. K., and V. Krishna Reddy. "Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments." International Journal of e-Collaboration 19, no. 3 (2023): 1–13. http://dx.doi.org/10.4018/ijec.316771.
Full textMuddumadappa, Parashiva Murthy Basavanapura, Sumithra Devi Kengeri Anjanappa, and Mallikarjunaswamy Srikantaswamy. "An Efficient Reconfigurable Cryptographic Model for Dynamic and Secure Unstructured Data Sharing in Multi-Cloud Storage Server." Journal of Intelligent Systems and Control 1, no. 1 (2022): 68–78. http://dx.doi.org/10.56578/jisc010107.
Full textQiao, Huidong, Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, and Ying Hu. "Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage." Symmetry 10, no. 10 (2018): 482. http://dx.doi.org/10.3390/sym10100482.
Full textChhaybi, Akram, and Saiida Lazaar. "Definition of a lightweight cryptographic solution to secure health data on IoT and cloud." General Letters in Mathematics 10, no. 2 (2021): 54–60. http://dx.doi.org/10.31559/glm2021.10.2.6.
Full textMr G shekar, Asthami Sai Kiran, Muthe Harish, and Padala Sai Rahul. "Multi tenancy cloud data with a shared privacy preserving trusted keyword search." International Journal of Information Technology and Computer Engineering 13, no. 2 (2025): 1290–95. https://doi.org/10.62647/ijitce2025v13i2pp1290-1295.
Full textChaudhari, Prithvi, Ji-Jian Chin, and Soeheila Moesfa Mohamad. "An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution." Journal of Informatics and Web Engineering 3, no. 1 (2024): 265–76. http://dx.doi.org/10.33093/jiwe.2024.3.1.19.
Full textMarwan, Mbarek, Abdelkarim Ait Temghart, Fatima Sifou, and Feda AlShahwan. "A Cloud Solution for Securing Medical Image Storage." Journal of information and organizational sciences 44, no. 1 (2020): 113–39. http://dx.doi.org/10.31341/jios.44.1.5.
Full textKrishnan, Ponnarasan. "IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing." International Journal of Science and Research (IJSR) 13, no. 9 (2024): 1349–63. http://dx.doi.org/10.21275/sr24922232225.
Full textRehman, Saba, Nida Talat Bajwa, Munam Ali Shah, Ahmad O. Aseeri, and Adeel Anjum. "Hybrid AES-ECC Model for the Security of Data over Cloud Storage." Electronics 10, no. 21 (2021): 2673. http://dx.doi.org/10.3390/electronics10212673.
Full textWang, Xu An, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, and Xiaoshuang Luo. "Cost-effective secure E-health cloud system using identity based cryptographic techniques." Future Generation Computer Systems 67 (February 2017): 242–54. http://dx.doi.org/10.1016/j.future.2016.08.008.
Full textBerlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–37. http://dx.doi.org/10.1145/3474056.
Full textSanthosh Kumar, P., and Latha Parthiban. "Scalable Anomaly Detection for Large-Scale Heterogeneous Data in Cloud Using Optimal Elliptic Curve Cryptography and Gaussian Kernel Fuzzy C-Means Clustering." Journal of Circuits, Systems and Computers 29, no. 05 (2019): 2050074. http://dx.doi.org/10.1142/s0218126620500747.
Full textGoyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.
Full textChen, Guo You, Jia Jia Miao, Feng Xie, and Han Dong Mao. "A Framework for Storage Security in Cloud Computing." Applied Mechanics and Materials 278-280 (January 2013): 1767–70. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1767.
Full textAdeoye, Seun, and Russel Adams. "IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Block Chain-Based Approach towards a Trustworthy Cloud Computing." Cognizance Journal of Multidisciplinary Studies 4, no. 10 (2024): 183–209. http://dx.doi.org/10.47760/cognizance.2024.v04i10.013.
Full textSeun, Adeoye, and Adams Russel. "IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Block Chain-Based Approach towards a Trustworthy Cloud Computing." Cognizance Journal of Multidisciplinary Studies (CJMS) 4, no. 10 (2024): 183–209. https://doi.org/10.47760/cognizance.2024.v04i10.013.
Full textGaud, Prof V. Y. "SeGShare: Secure Group File Sharing in the Cloud using Enclaves." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 1047–52. https://doi.org/10.22214/ijraset.2025.70327.
Full textKanimetta, Dileep Kumar. "Modernizing Financial Messaging Systems: A Technical Review of SWIFT Infrastructure Deployment on Microsoft Azure." International Journal of Computing and Engineering 7, no. 10 (2025): 17–29. https://doi.org/10.47941/ijce.2957.
Full textNaregal, Keerti, and Vijay Kalman. "CP-ABE Unveiled: A Path to Fine-Tuned Cloud Data Security." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 2 (2023): 20–25. http://dx.doi.org/10.46610/jcspic.2023.v02i02.004.
Full textČuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.
Full textAmit Kumar. "AI and edge computing: Real-time collaboration in distributed systems." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 1037–43. https://doi.org/10.30574/wjaets.2025.15.1.0214.
Full textNagaraj M Lutimath, Maria Navin J. R. ,. "An Enhanced AES-ECC model with Key Dependent Dynamic S-Box for the Security of Mobile Applications using Cloud Computing." Journal of Electrical Systems 20, no. 2 (2024): 2735–46. http://dx.doi.org/10.52783/jes.2050.
Full textAlharbi, Saud, Wasan Awad, and David Bell. "HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications." Future Internet 17, no. 7 (2025): 298. https://doi.org/10.3390/fi17070298.
Full textAnkit Gupta. "Blockchain-Based Tokenized Storage Incentives: Revolutionizing Decentralized Object Storage." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 854–64. https://doi.org/10.32628/cseit25111289.
Full textCharan Shankar Kummarapurugu. "AI-augmented blockchain for cloud data integrity assurance: Building trustworthy, tamper-proof data systems in distributed clouds." International Journal of Science and Research Archive 3, no. 1 (2021): 163–70. http://dx.doi.org/10.30574/ijsra.2021.3.1.0103.
Full textYousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.
Full text