Cryptography in Cloud Computing: Ensuring Data Confidentiality and Integrity

Authors

Keywords:

Cloud Computing; Cryptography; Data Confidentiality; Encryption Techniques; Cloud Security.

Abstract

Cloud computing revolutionized the storage and management of information in or-ganizations with the provision of elastic and inexpensive services. These benefits bear major risks, notably guaranteeing confidentiality and integrity of sensitive infor-mation. In this article, cryptography as a solution to the aforementioned concerns and to offer security for cloud systems is taken into consideration. Cryptography provides techniques that protect information against unauthorized usage and render infor-mation accurate and reliable. And presents the role of cryptography in cloud compu-ting, with special focus on its application in ensuring data confidentiality and integri-ty. It highlights various cryptographic techniques, including symmetric and asymmet-ric encryption, hashing, and digital signatures, and their weaknesses and strengths. The other new techniques, like lightweight cryptography, hybrid schemes, and ze-ro-knowledge authentication encrypted storage, have potential future impacts but are not yet unscalable or practical. Nevertheless, despite all this, encryption is still the foundation of cloud security through confidentiality and integrity protection. Ongoing innovation and better processes for verification should stem from an ability to contend with dynamic cyber threats and increase trust in cloud computing services.

References

R. Adee and H. Mouratidis, “A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography,” Sensors, vol. 22, no. 3, pp. 1–23, 2022, doi: 10.3390/s22031109.

P. Yang, N. Xiong, and J. Ren, “Data Security and Privacy Protection for Cloud Storage: A Survey,” IEEE Access, vol. 8, pp. 131723–131740, 2020, doi: 10.1109/ACCESS.2020.3009876.

H. C. Ukwuoma, G. Arome, A. Thompson, and B. K. Alese, “Post-quantum cryptography-driven security framework for cloud computing,” Open Comput. Sci., vol. 12, no. 1, pp. 142–153, 2022, doi: 10.1515/comp-2022-0235.

Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, and Philip Olaseni Shoetan, “Data Privacy and Security in It: a Review of Techniques and Challenges,” Comput. Sci. IT Res. J., vol. 5, no. 3, pp. 606–615, 2024, doi: 10.51594/csitrj.v5i3.909.

M. Tahir, M. Sardaraz, Z. Mehmood, and S. Muhammad, “CryptoGA: a cryptosystem based on genetic algorithm for cloud data security,” Cluster Comput., vol. 24, no. 2, pp. 739–752, 2021, doi: 10.1007/s10586-020-03157-4.

F. Thabit, A. P. S. Alhomdy, A. H. A. Al-Ahdal, and P. D. S. Jagtap, “A new lightweight cryptographic algorithm for enhancing data security in cloud computing,” Glob. Transitions Proc., vol. 2, no. 1, pp. 91–99, 2021, doi: 10.1016/j.gltp.2021.01.013.

U. Ogiela, “Cognitive cryptography for data security in cloud computing,” Concurr. Comput. Pract. Exp., vol. 32, no. 18, pp. 1–4, 2020, doi: 10.1002/cpe.5557.

Y. Alemami, A. M. Al-Ghonmein, K. G. Al-Moghrabi, and M. A. Mohamed, “Cloud data security and various cryptographic algorithms,” Int. J. Electr. Comput. Eng., vol. 13, no. 2, pp. 1867–1879, 2023, doi: 10.11591/ijece.v13i2.pp1867-1879.

S. Abidin, A. Swami, E. Ramirez-Asís, J. Alvarado-Tolentino, R. K. Maurya, and N. Hussain, “Quantum cryptography tech-nique: A way to improve security challenges in mobile cloud computing (MCC),” Mater. Today Proc., vol. 51, no. xxxx, pp. 508–514, 2021, doi: 10.1016/j.matpr.2021.05.593.

N. R. D. P. Astuti, E. Aribowo, and E. Saputra, “Data security improvements on cloud computing using cryptography and steganography,” IOP Conf. Ser. Mater. Sci. Eng., vol. 821, no. 1, 2020, doi: 10.1088/1757-899X/821/1/012041.

K. Sasikumar and S. Nagarajan, “Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing,” IEEE Access, vol. 12, no. April, pp. 52325–52351, 2024, doi: 10.1109/ACCESS.2024.3385449.

R. F. Abdel-Kader, S. H. El-Sherif, and R. Y. Rizk, “Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing,” Int. J. Electr. Comput. Eng., vol. 10, no. 3, pp. 3295–3306, 2020, doi: 10.11591/ijece.v10i3.pp3295-3306.

S. R. Gudimetla, “Data Encryption in Cloud Storage,” Int. Res. J. Mod. Eng. Technol. Sci., no. April, pp. 4–7, 2024, doi: 10.56726/irjmets50637.

K. Gupta, D. Gupta, S. K. Prasad, and P. Johri, “A Review on Cryptography based Data Security Techniques for the Cloud Computing,” 2021 Int. Conf. Adv. Comput. Innov. Technol. Eng. ICACITE 2021, pp. 1039–1044, 2021, doi: 10.1109/ICACITE51222.2021.9404568.

N. Mohammad, “Multi-Cloud Environments : a Comprehensive Study on Encryption Techniques and Access Control,” Int. J. Comput. Eng. Technol., vol. 12, no. 2, pp. 51–63, 2024.

A. Rajab, S. Aqeel, M. S. Al Reshan, A. Ashraf, S. Almakdi, and K. Rajab, “Cryptography based techniques of encryption for security of data in cloud computing paradigm,” Int. J. Eng. Trends Technol., vol. 69, no. 10, pp. 1–6, 2021, doi: 10.14445/22315381/IJETT-V69I10P201.

A. Musa and A. Mahmood, “Client-side Cryptography Based Security for Cloud Computing System,” Proc. - Int. Conf. Artif. Intell. Smart Syst. ICAIS 2021, pp. 594–600, 2021, doi: 10.1109/ICAIS50930.2021.9395890.

S. Zaineldeen and A. Ate, “Review of Cryptography in Cloud Computing Review of Cryptography in Cloud Computing,” vol. 9, no. 3, pp. 211–220, 2020.

L. G. De Lazo and D. P. V. S. Kumar, “Role and Importance of Cryptography Techniques in Cloud Computing,” Technoarete Trans. Internet Things Cloud Comput. Res., vol. 2, no. 2, 2022, doi: 10.36647/ttitccr/02.02.art005.

B. Sarkar, A. Saha, D. Dutta, G. De Sarkar, and K. Karmakar, “A Survey on the Advanced Encryption Standard (AES): A Pillar of Modern Cryptography,” Int. J. Comput. Sci. Mob. Comput., vol. 13, no. 4, pp. 68–87, 2024, doi: 10.47760/ijcsmc.2024.v13i04.008.

C. Manthiramoorthy, K. M. S. Khan, and N. A. A, “Comparing Several Encrypted Cloud Storage Platforms,” Int. J. Math. Stat. Comput. Sci., vol. 2, pp. 44–62, 2023, doi: 10.59543/ijmscs.v2i.7971.

Downloads

Published

2025-10-12

How to Cite

Hassan, S. H., & Abduallah, W. M. (2025). Cryptography in Cloud Computing: Ensuring Data Confidentiality and Integrity. Dasinya Journal for Engineering and Informatics, 1(1). Retrieved from https://dasinya.dpu.edu.krd/index.php/pub/article/view/6