Cryptography in Cloud Computing: Ensuring Data Confidentiality and Integrity
DOI:
https://doi.org/10.65542/djei.v1i1.6Keywords:
Cloud Computing; Cryptography; Data Confidentiality; Encryption Techniques; Cloud Security.Abstract
Cloud computing revolutionized the storage and management of information in or-ganizations with the provision of elastic and inexpensive services. These benefits bear major risks, notably guaranteeing confidentiality and integrity of sensitive infor-mation. In this article, cryptography as a solution to the aforementioned concerns and to offer security for cloud systems is taken into consideration. Cryptography provides techniques that protect information against unauthorized usage and render infor-mation accurate and reliable. And presents the role of cryptography in cloud compu-ting, with special focus on its application in ensuring data confidentiality and integri-ty. It highlights various cryptographic techniques, including symmetric and asymmet-ric encryption, hashing, and digital signatures, and their weaknesses and strengths. The other new techniques, like lightweight cryptography, hybrid schemes, and ze-ro-knowledge authentication encrypted storage, have potential future impacts but are not yet unscalable or practical. Nevertheless, despite all this, encryption is still the foundation of cloud security through confidentiality and integrity protection. Ongoing innovation and better processes for verification should stem from an ability to contend with dynamic cyber threats and increase trust in cloud computing services.
References
Adee, R.; Mouratidis, H. A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors 2022, 22, 1–23, doi:10.3390/s22031109. DOI: https://doi.org/10.3390/s22031109
Yang, P.; Xiong, N.; Ren, J. Data Security and Privacy Protection for Cloud Storage: A Survey. IEEE Access 2020, 8, 131723–131740, doi:10.1109/ACCESS.2020.3009876. DOI: https://doi.org/10.1109/ACCESS.2020.3009876
Ukwuoma, H.C.; Arome, G.; Thompson, A.; Alese, B.K. Post-Quantum Cryptography-Driven Security Framework for Cloud Computing. Open Comput. Sci. 2022, 12, 142–153, doi:10.1515/comp-2022-0235. DOI: https://doi.org/10.1515/comp-2022-0235
Oluwatoyin Ajoke Fayayola; Oluwabukunmi Latifat Olorunfemi; Philip Olaseni Shoetan Data Privacy and Security in It: A Review of Techniques and Challenges. Comput. Sci. IT Res. J. 2024, 5, 606–615, doi:10.51594/csitrj.v5i3.909. DOI: https://doi.org/10.51594/csitrj.v5i3.909
Tahir, M.; Sardaraz, M.; Mehmood, Z.; Muhammad, S. CryptoGA: A Cryptosystem Based on Genetic Algorithm for Cloud Data Security. Cluster Comput. 2021, 24, 739–752, doi:10.1007/s10586-020-03157-4. DOI: https://doi.org/10.1007/s10586-020-03157-4
Thabit, F.; Alhomdy, A.P.S.; Al-Ahdal, A.H.A.; Jagtap, P.D.S. A New Lightweight Cryptographic Algorithm for Enhancing Data Security in Cloud Computing. Glob. Transitions Proc. 2021, 2, 91–99, doi:10.1016/j.gltp.2021.01.013. DOI: https://doi.org/10.1016/j.gltp.2021.01.013
Ogiela, U. Cognitive Cryptography for Data Security in Cloud Computing. Concurr. Comput. Pract. Exp. 2020, 32, 1–4, doi:10.1002/cpe.5557. DOI: https://doi.org/10.1002/cpe.5557
Alemami, Y.; Al-Ghonmein, A.M.; Al-Moghrabi, K.G.; Mohamed, M.A. Cloud Data Security and Various Cryptographic Algorithms. Int. J. Electr. Comput. Eng. 2023, 13, 1867–1879, doi:10.11591/ijece.v13i2.pp1867-1879. DOI: https://doi.org/10.11591/ijece.v13i2.pp1867-1879
Abidin, S.; Swami, A.; Ramirez-Asís, E.; Alvarado-Tolentino, J.; Maurya, R.K.; Hussain, N. Quantum Cryptography Technique: A Way to Improve Security Challenges in Mobile Cloud Computing (MCC). Mater. Today Proc. 2021, 51, 508–514, doi:10.1016/j.matpr.2021.05.593. DOI: https://doi.org/10.1016/j.matpr.2021.05.593
Astuti, N.R.D.P.; Aribowo, E.; Saputra, E. Data Security Improvements on Cloud Computing Using Cryptography and Steganography. IOP Conf. Ser. Mater. Sci. Eng. 2020, 821, doi:10.1088/1757-899X/821/1/012041. DOI: https://doi.org/10.1088/1757-899X/821/1/012041
Sasikumar, K.; Nagarajan, S. Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing. IEEE Access 2024, 12, 52325–52351, doi:10.1109/ACCESS.2024.3385449. DOI: https://doi.org/10.1109/ACCESS.2024.3385449
Abdel-Kader, R.F.; El-Sherif, S.H.; Rizk, R.Y. Efficient Two-Stage Cryptography Scheme for Secure Distributed Data Storage in Cloud Computing. Int. J. Electr. Comput. Eng. 2020, 10, 3295–3306, doi:10.11591/ijece.v10i3.pp3295-3306. DOI: https://doi.org/10.11591/ijece.v10i3.pp3295-3306
Gudimetla, S.R. Data Encryption in Cloud Storage. Int. Res. J. Mod. Eng. Technol. Sci. 2024, 4–7, doi:10.56726/irjmets50637. DOI: https://doi.org/10.56726/IRJMETS50637
Gupta, K.; Gupta, D.; Prasad, S.K.; Johri, P. A Review on Cryptography Based Data Security Techniques for the Cloud Computing. 2021 Int. Conf. Adv. Comput. Innov. Technol. Eng. ICACITE 2021 2021, 1039–1044, doi:10.1109/ICACITE51222.2021.9404568. DOI: https://doi.org/10.1109/ICACITE51222.2021.9404568
Mohammad, N. Multi-Cloud Environments : A Comprehensive Study on Encryption Techniques and Access Control. Int. J. Comput. Eng. Technol. 2024, 12, 51–63.
Rajab, A.; Aqeel, S.; Reshan, M.S. Al; Ashraf, A.; Almakdi, S.; Rajab, K. Cryptography Based Techniques of Encryption for Security of Data in Cloud Computing Paradigm. Int. J. Eng. Trends Technol. 2021, 69, 1–6, doi:10.14445/22315381/IJETT-V69I10P201. DOI: https://doi.org/10.14445/22315381/IJETT-V69I10P201
Musa, A.; Mahmood, A. Client-Side Cryptography Based Security for Cloud Computing System. Proc. - Int. Conf. Artif. Intell. Smart Syst. ICAIS 2021 2021, 594–600, doi:10.1109/ICAIS50930.2021.9395890. DOI: https://doi.org/10.1109/ICAIS50930.2021.9395890
Zaineldeen, S.; Ate, A. Review of Cryptography in Cloud Computing Review of Cryptography in Cloud Computing. 2020, 9, 211–220.
Lazo, L.G. De; Kumar, D.P.V.S. Role and Importance of Cryptography Techniques in Cloud Computing. Technoarete Trans. Internet Things Cloud Comput. Res. 2022, 2, doi:10.36647/ttitccr/02.02.art005. DOI: https://doi.org/10.36647/TTITCCR/02.02.Art005
Sarkar, B.; Saha, A.; Dutta, D.; De Sarkar, G.; Karmakar, K. A Survey on the Advanced Encryption Standard (AES): A Pillar of Modern Cryptography. Int. J. Comput. Sci. Mob. Comput. 2024, 13, 68–87, doi:10.47760/ijcsmc.2024.v13i04.008. DOI: https://doi.org/10.47760/ijcsmc.2024.v13i04.008
Manthiramoorthy, C.; Khan, K.M.S.; A, N.A. Comparing Several Encrypted Cloud Storage Platforms. Int. J. Math. Stat. Comput. Sci. 2023, 2, 44–62, doi:10.59543/ijmscs.v2i.7971. DOI: https://doi.org/10.59543/ijmscs.v2i.7971
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Dasinya Journal for Engineering and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.










Dasinya Journal for Engineering and Informatics is licensed under a