To see the other types of publications on this topic, follow the link: Cryptographic cloud architecture.

Journal articles on the topic 'Cryptographic cloud architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cryptographic cloud architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

TN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.

Full text
Abstract:
Nowadays, the massive growth of data and the adoption of the cloud-based architecture indicate that the secure storage of data is a very essential issue. Cloud storage is the solution to convenient, scalable and cost-effective storage, yet security issues persist, especially regarding the protection of sensitive information. The encryption plays a vital role in which data is made unreadable and only accessible by those with the proper authorization. This helps in data management and minimizes data leaks. Shared responsibility in cloud security entails collaboration between the operators and us
APA, Harvard, Vancouver, ISO, and other styles
2

Dr., R. Sridevi*1 &. C. B. Banupriya2. "A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 602–5. https://doi.org/10.5281/zenodo.829787.

Full text
Abstract:
The cloud computing has become a revolution in information technology, it includes elements from grid computing, utility computing and autonomic computing into a creative deployment architecture. The web service use web service to provide high performance and easy access of storage infrastructure.In this paper a survey of existing cryptographic storage techniques and benefits in cloud computing is discussed
APA, Harvard, Vancouver, ISO, and other styles
3

Karanam, Madhavi, Sahithi Reddy S, Abhinav Chakilam, and Srinu Banothu. "Performance Evaluation of Cryptographic Security Algorithms on Cloud." E3S Web of Conferences 391 (2023): 01015. http://dx.doi.org/10.1051/e3sconf/202339101015.

Full text
Abstract:
Cloud computing is a cost-effective approach to provide on demand computing and data storage solutions. Data storage is one of the key services provided by the cloud. Cloud offers improved efficiency, flexibility, and scalability, but all these advantages can be overturned if security is not taken into consideration. It is the cloud vender’s responsibility to keep the data safe with highly secure cloud services, which helps them earn the trust of the customers. Today, cloud security is critical since most organizations are already using cloud computing in alternate forms. There is always a con
APA, Harvard, Vancouver, ISO, and other styles
4

Thakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.

Full text
Abstract:
With the growing reliance on cloud computing for storing and managing data, providing security and performance for cloud storage systems has become very important and multicloud solutions offers both. Current cloud architectures suffer from scalability, security, and efficiency issues in distributed cloud systems. In this paper, we introduce a ChaCha20-encryption, a fast stream cipher and Blake3, an adaptive cryptographic hash function, and dynamic chunk allocation to an existing architecture that progressively improves data confidentiality, integrity, and redundancy. The experiment focuses on
APA, Harvard, Vancouver, ISO, and other styles
5

Hathout, Basma Badawi, Samy Ghoniemy, and Osman Ibrahim. "A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 6. http://dx.doi.org/10.3991/ijim.v11i2.6553.

Full text
Abstract:
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of sensitive data on remote machines that are not owned, or even managed by the customers themselves. In this paper, initially a homomorphic encryption-based Cryptographic Agent is proposed. The proposed Cryptographic Agent is based on Paillier scheme, and is supported by user-configurable software protection and data privacy categorization agents,
APA, Harvard, Vancouver, ISO, and other styles
6

Aiello, Samuel. "How Cryptography Can Augment Zero Trust." International Journal of Blockchain Technologies and Applications 1, no. 1 (2023): 52–60. http://dx.doi.org/10.18178/ijbta.2023.1.1.52-60.

Full text
Abstract:
The scope of this work presents the security architecture of the Cloud provider/consumer and showcases how “Cryptography” augments the Zero Trust Architecture security strategy. In addition, this work will delve into enforcing the minimum expected set of security controls that assures secure isolation, data protection, access control and monitoring/logging at all tiers of the hosted applications. Cryptographic solutions play an important role in the cloud environment in which customers hand over data to a cloud provider for storage, and processing. One of the biggest hurdles for the adoption o
APA, Harvard, Vancouver, ISO, and other styles
7

Bhuite, Prof S. S. "A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47316.

Full text
Abstract:
Abstract— This paper introduced a robust and efficient framework designed to ensure secure dynamic data handling and public auditing in cloud storage systems. The primary goal was to strengthen data integrity and user confidentiality using advanced cryptographic methods and privacy-aware third-party auditing (TPA). An in- depth analysis of existing cloud security models was conducted to uncover persistent challenges such as secure management of data updates, protection of user privacy, and reliable auditing within potentially untrusted cloud environments. To address these issues, a modular sys
APA, Harvard, Vancouver, ISO, and other styles
8

Abhale, Babasaheb Annasaheb, and Rohita Yamaganti Dr. "Mitigating cybersecurity risks in cloud computing through cryptographic protocols and service architecture." International Journal of Trends in Emerging Research and Development 2, no. 6 (2024): 153–59. https://doi.org/10.5281/zenodo.15239402.

Full text
Abstract:
The capabilities of cloud computing have moved the IT industry forward, with large enterprises migrating their processing and storage to it. One mainstream service mode for public cloud computing is Infrastructure as a Service (IaaS) public cloud. Cloud computing has several advantages when it comes to cyber-security, but one of the main ones is the heightened security measures offered by reputable CSPs Cloud computing is continuously altering how organizations store, use, and share software, workloads, and data Cloud computing is a cutting-edge technological development with huge worldwide im
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Yilin. "Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security." Applied and Computational Engineering 145, no. 1 (2025): 51–56. https://doi.org/10.54254/2755-2721/2025.21867.

Full text
Abstract:
In an era of rapid technological evolution, cloud computing has become indispensable across various industries due to its cost-efficiency, scalability, and accessibility. Yet, privacy and security concerns persist, as sensitive data can be susceptible to breaches and unauthorized access. At present, the two mainstream cloud computing architectures are centralized architecture and decentralized architecture. Both have advantages and disadvantages in terms of confidentiality, integrity and data availability. This paper employs a comparative analysis of these two architectures, synthesizing insig
APA, Harvard, Vancouver, ISO, and other styles
10

Fairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.

Full text
Abstract:
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in
APA, Harvard, Vancouver, ISO, and other styles
11

Gaurav, Raj1 and Kamaljit Kaur2. "Secure Cloud Communication for Effective Cost Management System through MSBE." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, June (2018): 01–12. https://doi.org/10.5281/zenodo.1440834.

Full text
Abstract:
In Cloud Computing Architecture, Brokers are responsible to provide services to the end users. An Effective Cost Management System (ECMS) which works over Secure Cloud Communication Paradigm (SCCP) helps in finding a communication link with overall minimum cost of links. We propose an improved Broker Cloud Communication Paradigm (BCCP) with integration of security issues. Two algorithms are included, first is Secure Optimized Route Cost Finder (S-ORCF) to find optimum route between broker and cloud on the behalf of cost factor and second is Secure Optimized Route Management (S-ORM) to maintain
APA, Harvard, Vancouver, ISO, and other styles
12

Badr, Aymen Mudheher, Yi Zhang, and Hafiz Gulfam Ahmad Umar. "Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing." Electronics 8, no. 2 (2019): 171. http://dx.doi.org/10.3390/electronics8020171.

Full text
Abstract:
The increasing use of cloud computing, especially in commercial, government and healthcare institutions, started with the use of computerized clouds. Clouds store important data, which reduces the cost of management and ensures easy access. To protect this data, cryptographic methods are used to ensure confidentiality of the data, as well as to secure access to user data and increase trust in cloud technology. In our paper, we suggest a new scheme to support an attribute-based encryption system (ABE) that involves multiple parties such as data owners, data users, cloud servers and authority. A
APA, Harvard, Vancouver, ISO, and other styles
13

Mohammad Asad Hussain. "Blockchain for secure data integration in multi-cloud and hybrid cloud systems." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 743–53. https://doi.org/10.30574/wjarr.2025.26.2.1658.

Full text
Abstract:
This article presents a comprehensive framework for applying blockchain technology to secure data integration challenges in multi-cloud and hybrid-cloud environments. This article examines how distributed ledger technology creates a trust layer that addresses key vulnerabilities in traditional integration approaches while maintaining performance characteristics suitable for enterprise deployments. This article's architecture leverages permissioned blockchain networks, smart contracts, and cryptographic verification mechanisms to ensure data integrity, enforce governance policies, and provide i
APA, Harvard, Vancouver, ISO, and other styles
14

Arunkumar, R. Josephius, and R. Anbuselvi. "An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 239. http://dx.doi.org/10.23956/ijarcsse.v7i8.57.

Full text
Abstract:
Now-a-days, most hospitals and medical centers is to manage huge volume of patient’s medical records into database. It is essential to collect and access this information everywhere, to increase productivity and improve quality of health cares. Need to access electronic health information across the world and improve the quality of healthcare to patients will highlight importance of using cloud computing architecture in this area. But, despite the benefits of cloud computing applications for health care, the security challenges of cloud should be addressed. In this paper, we introduce and desc
APA, Harvard, Vancouver, ISO, and other styles
15

Lin, Han-Yu, and Yan-Ru Jiang. "A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System." Applied Sciences 11, no. 1 (2020): 63. http://dx.doi.org/10.3390/app11010063.

Full text
Abstract:
Population aging is currently a tough problem of many countries. How to utilize modern technologies (including both information and medical technologies) to improve the service quality of health information is an important issue. Personal Health Record (PHR) could be regarded as a kind of health information records of individuals. A ciphertext policy attribute-based encryption (CP-ABE) is a cryptographic primitive for fine-grained access control of outsourced data in clouds. In order to enable patients to effectively store his medical records and PHR data in medical clouds, we propose an impro
APA, Harvard, Vancouver, ISO, and other styles
16

Muneera, M. Nafees, G. Anbu Selvi, V. Vaissnave, and Gopal Lal Rajora. "A Cryptographic based I2ADO-DNN Security Framework for Intrusion Detection in Cloud Systems." International Journal of Computer Network and Information Security 15, no. 6 (2023): 40–51. http://dx.doi.org/10.5815/ijcnis.2023.06.04.

Full text
Abstract:
Cloud computing's popularity and success are directly related to improvements in the use of Information and Communication Technologies (ICT). The adoption of cloud implementation and services has become crucial due to security and privacy concerns raised by outsourcing data and business applications to the cloud or a third party. To protect the confidentiality and security of cloud networks, a variety of Intrusion Detection System (IDS) frameworks have been developed in the conventional works. However, the main issues with the current works are their lengthy nature, difficulty in intrusion det
APA, Harvard, Vancouver, ISO, and other styles
17

Shamshad, Shuhab, Farina Riaz, Rabia Riaz, Sanam Shahla Rizvi, and Shahab Abdulla. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors 22, no. 21 (2022): 8151. http://dx.doi.org/10.3390/s22218151.

Full text
Abstract:
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing el
APA, Harvard, Vancouver, ISO, and other styles
18

Neethu V A. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 327–37. https://doi.org/10.52783/jisem.v10i16s.2599.

Full text
Abstract:
Cloud computing's rise has brought with it concerns about data privacy and integrity as a result of an increase in cyber threats as well as centralized security weaknesses. To resolve the problem, this project combines Blockchain and quantum cryptography as a single work. Blockchain is famous for its decentralization. It promises transparency and resistance to manipulation with its open, unchangeable ledger. Quantum cryptography with Quantium Key Distribution (QKD) defends against both present and future quantum computer invaders. Using this technology, the project aims to enhance cloud data p
APA, Harvard, Vancouver, ISO, and other styles
19

Neethu V A, Arun Vaishnav, Mohammad Akram Khan. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 52–62. https://doi.org/10.52783/jisem.v10i16s.2559.

Full text
Abstract:
Cloud computing's rise has brought with it concerns about data privacy and integrity as a result of an increase in cyber threats as well as centralized security weaknesses. To resolve the problem, this project combines Blockchain and quantum cryptography as a single work. Blockchain is famous for its decentralization. It promises transparency and resistance to manipulation with its open, unchangeable ledger. Quantum cryptography with Quantium Key Distribution (QKD) defends against both present and future quantum computer invaders. Using this technology, the project aims to enhance cloud data p
APA, Harvard, Vancouver, ISO, and other styles
20

Vani, K. H., and Dr P. Balamurugan. "Comparative Analysis of Trust-Based Data Storage Management Techniques in Dynamic Cloud Service." International Journal of Basic and Applied Sciences 14, no. 3 (2025): 258–65. https://doi.org/10.14419/vbn70d23.

Full text
Abstract:
Cloud computing (CC) has emerged as a transformative paradigm for data storage and service delivery. However, challenges in ‎trust management, data confidentiality, and quality assurance continue to limit its scalability and user adoption. To address these ‎limitations, this study proposes a Triple-layered Trust Evaluation Model (TTEM) that integrates trust computation, optimized ‎cryptographic key generation, and a layered architecture comprising edge, fog, and cloud nodes. The model dynamically ‎evaluates service providers based on multiple Quality of Service (QoS) attributes—such as bandwid
APA, Harvard, Vancouver, ISO, and other styles
21

Vijai, Anand Ramar, and Kumar R. Veerandra. "ENHANCING DATA PRIVACY AND SECURITY IN CLOUD HEALTHCARE SOLUTIONS USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC)." International Journal Of Engineering Technology Research & Management (IJETRM) 03, no. 05 (2019): 133–43. https://doi.org/10.5281/zenodo.15600580.

Full text
Abstract:
The rapid adoption of cloud computing in healthcare has revolutionized medical data management by providingscalability, interoperability, and remote access. The change has also increased privacy and security riskssimultaneously, particularly with the sensitive nature of patient health information and the proliferation of IoTbased medical devices. a secure and light-weight cloud healthcare model founded on Elliptic Curve Cryptography(ECC) for maintaining confidentiality and integrity of electronic health information entire lifecycle—collection,cloud storage and authorized retrieval.The ar
APA, Harvard, Vancouver, ISO, and other styles
22

prasanna,, G. Laxmi. "PRIVACY PRESERVING DATA SHARING CLOUD-BASED HEALTHCARE SYSTEMS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40474.

Full text
Abstract:
The integration of cloud computing into healthcare systems has revolutionized data management by enabling seamless data sharing and enhanced accessibility, thereby improving patient outcomes and operational efficiency. However, the sensitive nature of healthcare data necessitates robust privacy-preserving mechanisms to protect patient confidentiality. This paper explores state-of-the-art techniques such as cryptography, data anonymization, and secure access control, which are tailored to address privacy challenges in healthcare environments. It also critically evaluates existing frameworks, id
APA, Harvard, Vancouver, ISO, and other styles
23

V Uday Kumar and Kaila Shahu Chatrapati. "Hybrid Hash Trees in Blockchain: Evaluating Algorithm Combinations for Speed and Security." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 3 (2025): 1356–66. https://doi.org/10.32628/ijsrset2512181.

Full text
Abstract:
Blockchain technology relies heavily on cryptographic hashing for ensuring data integrity, transaction security, and tamper resistance. However, with increasing data volume and demand for real-time processing, traditional hashing mechanisms often struggle to balance speed and security. This paper proposes and evaluates a novel Hybrid Hash Tree architecture that integrates multiple hash algorithms to optimize both performance and cryptographic strength. By combining the efficiency of lightweight hash functions with the robustness of secure hashing algorithms, the hybrid model aims to accelerate
APA, Harvard, Vancouver, ISO, and other styles
24

Gouru, Navya, and NagaLakshmi Vadlamani. "DistProv-Data Provenance in Distributed Cloud for Secure Transfer of Digital Assets with Ethereum Blockchain using ZKP." International Journal of Open Source Software and Processes 10, no. 3 (2019): 1–18. http://dx.doi.org/10.4018/ijossp.2019070101.

Full text
Abstract:
The importance and usage of the distributed cloud is increasing rapidly over a traditionally centralized cloud for the storing and exchanging of digital assets between untrusted parties in many business sectors. Storing the digital assets in the distributed cloud is considered superior to traditional cloud computing in terms of environmentally friendly, cost, security and other technical dimensions. In this article, a contemporary architecture DistProv is proposed where an open source distributed cloud IPFS is used to store and transfer the digital assets between the consignor and consignee. T
APA, Harvard, Vancouver, ISO, and other styles
25

Yakoob, S. K., and V. Krishna Reddy. "Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments." International Journal of e-Collaboration 19, no. 3 (2023): 1–13. http://dx.doi.org/10.4018/ijec.316771.

Full text
Abstract:
Distributed computing is a forceful idea in disseminated registering which depicts versatile information to the executives for a minimal price dependent on client interest to various business associations. Because of multi-cloud identity-based encryption over distributed environment, in this document, the authors present and implement a novel identity-based multi-cloud security access control approach (NIMSACPA) for efficient security in multi data security and privacy based on three basic parametric concepts: 1) open minded security between autonomous user privacy using Byzantine protocol, 2)
APA, Harvard, Vancouver, ISO, and other styles
26

Muddumadappa, Parashiva Murthy Basavanapura, Sumithra Devi Kengeri Anjanappa, and Mallikarjunaswamy Srikantaswamy. "An Efficient Reconfigurable Cryptographic Model for Dynamic and Secure Unstructured Data Sharing in Multi-Cloud Storage Server." Journal of Intelligent Systems and Control 1, no. 1 (2022): 68–78. http://dx.doi.org/10.56578/jisc010107.

Full text
Abstract:
This study designs a reconfigurable multi-cloud storage server architecture for dynamic and secure data sharing has been designed, improves the security of unstructured data using cryptographic index-based data slicing (CIBDS), and reduces the malicious insider through data encryption using a third data encryption algorithm (3DEA). Focusing on multi-cloud storage server (MCSS) and data life cycle which includes three stages (i.e., data input, transition and utilization), the authors determined the efficiency of reconfigurable data file slicing, standard format, privacy and trustworthiness of t
APA, Harvard, Vancouver, ISO, and other styles
27

Qiao, Huidong, Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, and Ying Hu. "Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage." Symmetry 10, no. 10 (2018): 482. http://dx.doi.org/10.3390/sym10100482.

Full text
Abstract:
Cryptographic cloud storage (CCS) is a secure architecture built in the upper layer of a public cloud infrastructure. In the CCS system, a user can define and manage the access control of the data by himself without the help of cloud storage service provider. The ciphertext-policy attribute-based encryption (CP-ABE) is considered as the critical technology to implement such access control. However, there still exists a large security obstacle to the implementation of CP-ABE in CCS. That is, how to identify the malicious cloud user who illegally shares his private keys with others or applies hi
APA, Harvard, Vancouver, ISO, and other styles
28

Chhaybi, Akram, and Saiida Lazaar. "Definition of a lightweight cryptographic solution to secure health data on IoT and cloud." General Letters in Mathematics 10, no. 2 (2021): 54–60. http://dx.doi.org/10.31559/glm2021.10.2.6.

Full text
Abstract:
The Internet of Things (IoT) and the Cloud Computing are among the main technologies influencing the quality and efficiency of our social and economic activities. Their importance is quite notable in several areas such as remote medical care and healthcare monitoring systems. These later face difficulties most of them are the expensive costs for the chronic diseases and the hospitals charges specially during the pandemic time. All these issues have led to the creation of new solutions for enhancing the quality of the healthcare systems. In this paper, we focus on the network architecture secur
APA, Harvard, Vancouver, ISO, and other styles
29

Mr G shekar, Asthami Sai Kiran, Muthe Harish, and Padala Sai Rahul. "Multi tenancy cloud data with a shared privacy preserving trusted keyword search." International Journal of Information Technology and Computer Engineering 13, no. 2 (2025): 1290–95. https://doi.org/10.62647/ijitce2025v13i2pp1290-1295.

Full text
Abstract:
In today's cloud computing environment, secure and efficient data sharing is paramount. This project proposes a secure cloud-based data sharing and verification system using the Verifiable yet Accountable Keyword Searchable Encryption (VAKSE) scheme. The system architecture is divided into four modules involving the Cloud Service Provider (CSP), Verifier, Data Owner, and Client, each playing a key role in secure data handling and verification. The first module focuses on the Cloud Service Provider (CSP), which manages user login, stores data owner and client details, generates cryptographic ke
APA, Harvard, Vancouver, ISO, and other styles
30

Chaudhari, Prithvi, Ji-Jian Chin, and Soeheila Moesfa Mohamad. "An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution." Journal of Informatics and Web Engineering 3, no. 1 (2024): 265–76. http://dx.doi.org/10.33093/jiwe.2024.3.1.19.

Full text
Abstract:
Searchable Symmetric Encryption (SSE) has come to be as an integral cryptographic approach in a world where digital privacy is essential. The capacity to search through encrypted data whilst maintaining its integrity meets the most important demand for security and confidentiality in a society that is increasingly dependent on cloud-based services and data storage. SSE offers efficient processing of queries over encrypted datasets, allowing entities to comply with data privacy rules while preserving database usability. Our research goes into this need, concentrating on the development and thor
APA, Harvard, Vancouver, ISO, and other styles
31

Marwan, Mbarek, Abdelkarim Ait Temghart, Fatima Sifou, and Feda AlShahwan. "A Cloud Solution for Securing Medical Image Storage." Journal of information and organizational sciences 44, no. 1 (2020): 113–39. http://dx.doi.org/10.31341/jios.44.1.5.

Full text
Abstract:
Cloud computing is an easy-to-use, affordable solution to manage and analyze medical data. Therefore, this paradigm has gained wide acceptance in the healthcare sector as a cost-efficient way for a successful Electronic Medical Records (EMR) implementation. Cloud technology is, however, subject to increasing criticism because of the numerous security vulnerabilities. In this regard, we propose a framework to protect confidential data through the development of new security measures, including compression, secret share scheme and XOR operation. The primary objective of the proposal is to achiev
APA, Harvard, Vancouver, ISO, and other styles
32

Krishnan, Ponnarasan. "IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing." International Journal of Science and Research (IJSR) 13, no. 9 (2024): 1349–63. http://dx.doi.org/10.21275/sr24922232225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rehman, Saba, Nida Talat Bajwa, Munam Ali Shah, Ahmad O. Aseeri, and Adeel Anjum. "Hybrid AES-ECC Model for the Security of Data over Cloud Storage." Electronics 10, no. 21 (2021): 2673. http://dx.doi.org/10.3390/electronics10212673.

Full text
Abstract:
A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The user has access to the data anywhere and at any time. However, the data over the cloud do not remain secure all the time. Since the data are accessible to the end user only by using the interference of a third party, it is prone to breach of authentication and integrity of the data. Moreover, cloud computing allows simultaneous users to access and retrieve their data online over different Internet connections, which leads to the e
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Xu An, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, and Xiaoshuang Luo. "Cost-effective secure E-health cloud system using identity based cryptographic techniques." Future Generation Computer Systems 67 (February 2017): 242–54. http://dx.doi.org/10.1016/j.future.2016.08.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Berlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–37. http://dx.doi.org/10.1145/3474056.

Full text
Abstract:
To facilitate the adoption of cloud by organizations, Cryptographic Access Control (CAC) is the obvious solution to control data sharing among users while preventing partially trusted Cloud Service Providers (CSP) from accessing sensitive data. Indeed, several CAC schemes have been proposed in the literature. Despite their differences, available solutions are based on a common set of entities—e.g., a data storage service or a proxy mediating the access of users to encrypted data—that operate in different (security) domains—e.g., on-premise or the CSP. However, the majority of these CAC schemes
APA, Harvard, Vancouver, ISO, and other styles
36

Santhosh Kumar, P., and Latha Parthiban. "Scalable Anomaly Detection for Large-Scale Heterogeneous Data in Cloud Using Optimal Elliptic Curve Cryptography and Gaussian Kernel Fuzzy C-Means Clustering." Journal of Circuits, Systems and Computers 29, no. 05 (2019): 2050074. http://dx.doi.org/10.1142/s0218126620500747.

Full text
Abstract:
In most systems, a smart functionality is enabled through an essential vital service such as detecting anomalies from complex, large-scale and dynamic data. However, ensuring the privacy and security for the cloud data is the most crucial and challenging task in the present world. Moreover, it is important to safeguard the security of sensitive data and its privacy from unauthorized parties who are trying to access the data. Therefore, to accomplish this task, several encryption, decryption and key generation mechanisms were introduced in the existing works for privacy preserving in cloud plat
APA, Harvard, Vancouver, ISO, and other styles
37

Goyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.

Full text
Abstract:
Cloud computing is mentioned to evolve dynamically and cloud transformation is getting easier all the time. Different cloud aspects are emerging in an efficient manner and have the potential to transform the traditional way of computing. With the advent of data sharing in cloud computing, the demand for outsourcing data has rapidly increased in the last decade. However, several security and privacy challenges exist impeding the acceptance of cloud computing. A highly secure system is required to guard an organizational entity, its resources, and assets. In this article, we propose and implemen
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Guo You, Jia Jia Miao, Feng Xie, and Han Dong Mao. "A Framework for Storage Security in Cloud Computing." Applied Mechanics and Materials 278-280 (January 2013): 1767–70. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1767.

Full text
Abstract:
Cloud computing has been a hot researching area of computer network technology, since it was proposed in 2007. Cloud computing also has been envisioned as the next-generation architecture of IT Enterprise [1]. Cloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. It moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy [2]. This poses many new security challenges. In this paper, we just focus on data storage security in the cloud, which has been the most im
APA, Harvard, Vancouver, ISO, and other styles
39

Adeoye, Seun, and Russel Adams. "IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Block Chain-Based Approach towards a Trustworthy Cloud Computing." Cognizance Journal of Multidisciplinary Studies 4, no. 10 (2024): 183–209. http://dx.doi.org/10.47760/cognizance.2024.v04i10.013.

Full text
Abstract:
Cloud computing remains one of the most significant advancements in resource provision to organizations in the latest decades since they initiate conveniences on demand access. The adoption of the IoT has brought about a new era of collaborative computing by employing a pool of linked smart sensors and devices that will produce and analyze great amounts of data, thus creating new related problems in terms of size and security, hence increasing even more the importance of traditional security measures. Therefore, in this paper, we synthesize a new SSCA that combines IoT and cryptographic mechan
APA, Harvard, Vancouver, ISO, and other styles
40

Seun, Adeoye, and Adams Russel. "IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Block Chain-Based Approach towards a Trustworthy Cloud Computing." Cognizance Journal of Multidisciplinary Studies (CJMS) 4, no. 10 (2024): 183–209. https://doi.org/10.47760/cognizance.2024.v04i10.013.

Full text
Abstract:
Cloud computing remains one of the most significant advancements in resource provision to organizations in the latest decades since they initiate conveniences on demand access. The adoption of the IoT has brought about a new era of collaborative computing by employing a pool of linked smart sensors and devices that will produce and analyze great amounts of data, thus creating new related problems in terms of size and security, hence increasing even more the importance of traditional security measures. Therefore, in this paper, we synthesize a new SSCA that combines IoT and cryptographic mechan
APA, Harvard, Vancouver, ISO, and other styles
41

Gaud, Prof V. Y. "SeGShare: Secure Group File Sharing in the Cloud using Enclaves." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 1047–52. https://doi.org/10.22214/ijraset.2025.70327.

Full text
Abstract:
File sharing applications using cloud storage are in- creasingly popular for personal and business use. Due to data pro- tection concerns, end-to-end encryption is often a desired feature of these applications. Many attempts at designing cryptographic solutions fail to be adopted due to missing relevant features. We present SeGShare, a new architecture for end-toend encrypted, group-based file sharing using trusted execution environments (TEE), e.g., Intel SGX. SeGShare is the first solution to protect the confidentiality and integrity of all data and management files; enforce immediate permis
APA, Harvard, Vancouver, ISO, and other styles
42

Kanimetta, Dileep Kumar. "Modernizing Financial Messaging Systems: A Technical Review of SWIFT Infrastructure Deployment on Microsoft Azure." International Journal of Computing and Engineering 7, no. 10 (2025): 17–29. https://doi.org/10.47941/ijce.2957.

Full text
Abstract:
The global financial messaging landscape faces unprecedented challenges as traditional on-premise SWIFT infrastructures encounter significant operational limitations, escalating maintenance costs, and evolving regulatory requirements that threaten long-term viability. Microsoft Azure emerges as a transformative solution, offering comprehensive cloud services specifically designed for high-assurance financial workloads. Azure Confidential Computing provides hardware-based security enclaves protecting sensitive data during processing, while Virtual Network isolation creates secure, logically sep
APA, Harvard, Vancouver, ISO, and other styles
43

Naregal, Keerti, and Vijay Kalman. "CP-ABE Unveiled: A Path to Fine-Tuned Cloud Data Security." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 2 (2023): 20–25. http://dx.doi.org/10.46610/jcspic.2023.v02i02.004.

Full text
Abstract:
Cloud computing has revolutionized data storage and processing, but it has also introduced significant challenges in ensuring data privacy and access control. In this research paper, we explore and understand the potential of Ciphertext Policy Attribute-Based Encryption (CP-ABE) as a cryptographic solution for enhancing cloud security through fine-grained access control. Our exploration begins with a comprehensive analysis of CP-ABE, including its architecture, components, and encryption/decryption processes. We delve into the security aspects of CP-ABE, evaluating its strengths, advantages, a
APA, Harvard, Vancouver, ISO, and other styles
44

Čuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.

Full text
Abstract:
The topic of this contribution is the practical use of secret sharing schemes in securing private data. In the first part, we focus on the security model and the overview of the available solutions. In the second part, we describe our solution for storing sensitive data in commercial cloud storage systems, an application called Datachest. The application uploads the data in encrypted form. Cryptographic keys are divided into shares. Each cloud receives one share. This solution improves the security of users’ sensitive data in the cloud. In the final part, we explore the ramifications of secret
APA, Harvard, Vancouver, ISO, and other styles
45

Amit Kumar. "AI and edge computing: Real-time collaboration in distributed systems." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 1037–43. https://doi.org/10.30574/wjaets.2025.15.1.0214.

Full text
Abstract:
The convergence of artificial intelligence and edge computing represents a transformative shift in distributed systems architecture, fundamentally altering how computational intelligence functions across networks. This integration addresses critical challenges in contemporary digital ecosystems, where exponential data growth overwhelms traditional cloud-centric models and necessitates real-time processing capabilities closer to data sources. Edge-based AI processing enables decision-making within milliseconds rather than hundreds of milliseconds, opening possibilities for applications previous
APA, Harvard, Vancouver, ISO, and other styles
46

Nagaraj M Lutimath, Maria Navin J. R. ,. "An Enhanced AES-ECC model with Key Dependent Dynamic S-Box for the Security of Mobile Applications using Cloud Computing." Journal of Electrical Systems 20, no. 2 (2024): 2735–46. http://dx.doi.org/10.52783/jes.2050.

Full text
Abstract:
The spectacular growth of computational clouds has drawn attention and enabled intensive computing on client devices with constrained resources. Smart phones mostly use the data centre demand service model to provide data to computationally intensive applications. It is challenging to outsource sensitive and private information to distant data centres due to growing concerns about data privacy and security. Therefore, conventional security algorithms have to be upgraded to address the brand-new security concerns that have emerged in the cloud environment. The Advanced Encryption Standard (AES)
APA, Harvard, Vancouver, ISO, and other styles
47

Alharbi, Saud, Wasan Awad, and David Bell. "HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications." Future Internet 17, no. 7 (2025): 298. https://doi.org/10.3390/fi17070298.

Full text
Abstract:
Internet of Things (IoT) technology in healthcare has enabled innovative services that enhance patient monitoring, diagnostics and medical data management. However, securing sensitive health data while maintaining system efficiency of resource-constrained IoT devices remains a critical challenge. This work presents a comprehensive end-to-end IoT security framework for healthcare environments, addressing encryption at two key levels: lightweight encryption at the edge for resource-constrained devices and robust end-to-end encryption when transmitting data to the cloud via MQTT cloud brokers. Th
APA, Harvard, Vancouver, ISO, and other styles
48

Ankit Gupta. "Blockchain-Based Tokenized Storage Incentives: Revolutionizing Decentralized Object Storage." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 854–64. https://doi.org/10.32628/cseit25111289.

Full text
Abstract:
This article presents an innovative approach to decentralized object storage that combines blockchain technology, distributed hash tables (DHTs), and advanced cryptographic techniques. The proposed system addresses the limitations of traditional centralized storage infrastructures by implementing a token-based incentive mechanism that encourages network participation while ensuring data security and availability. By integrating proof-of-storage consensus mechanisms consensus mechanisms, homomorphic encryption, and erasure coding, the architecture demonstrates superior fault tolerance and opera
APA, Harvard, Vancouver, ISO, and other styles
49

Charan Shankar Kummarapurugu. "AI-augmented blockchain for cloud data integrity assurance: Building trustworthy, tamper-proof data systems in distributed clouds." International Journal of Science and Research Archive 3, no. 1 (2021): 163–70. http://dx.doi.org/10.30574/ijsra.2021.3.1.0103.

Full text
Abstract:
The integrity of data stored in cloud environments is a critical concern as organizations increasingly rely on distributed cloud services for their data storage and processing needs. Traditional methods of data integrity assurance, such as cryptographic hashing and third-party audits, often fail to provide the required levels of security due to their centralized nature and reliance on trust in third-party entities. This paper proposes an AI augmented blockchain framework designed to provide a robust, decentralized solution for data integrity assurance in distributed cloud environments. By inte
APA, Harvard, Vancouver, ISO, and other styles
50

Yousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.

Full text
Abstract:
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing. Design/methodology/approach The paper analyzes the IoT security from three perspectives:
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!