Cloud Data Security with Enhanced Cryptography

  • Seema Devi and Dr. Kalpna Midha
  • Show Author Details
  • Seema Devi

    Phd Scholar at Shri khushal Das University, Hanumangarh, India

  • Dr. Kalpna Midha

    Assistant Professor at Shri khushal Das University, Hanumangarh, India

  • img Download Full Paper

Abstract

Cloud computing is the outgrowth of ongoing developments in Internet grounded services and the technology assiduity. All pall services need a high- performance pall storehouse room in order to satisfy client demands. still, cloud surroundings' participated residency and natural distributed nature give serious security pitfalls, especially with regard to data vacuity, confidentiality, and integrity. Even though they're abecedarian, traditional cryptographic ways constantly fail to handle the particular complexity of cloud data. In the environment of cloud surroundings, we will explore the fundamentals, uses, and difficulties of bettered cryptographic results similar post-quantum cryptography block chain- grounded security, homomorphic encryption, and trait- grounded encryption. The thing of the study is to present a thorough analysis of the state- of- the- art and implicit future paths in cloud data security using advanced cryptographic ways. We will delve into the principles, applications, and challenges of enhanced cryptographic solutions such as Homomorphic Encryption, Attribute-Based Encryption, Block chain-based security, and Post-Quantum Cryptography in the context of cloud environments. The paper aims to provide a comprehensive overview of the current state-of-the-art and future directions in securing cloud data with sophisticated cryptographic mechanisms.

Keywords

  • Cloud Security
  • Data Encryption
  • Homomorphic Encryption
  • Attribute-Based Encryption
  • Blockchain
  • Post-Quantum Cryptography
  • Data Confidentiality
  • Data Integrity
  • Access Control

Type

Research Paper

Information

International Journal of Law Management and Humanities, Volume 8, Issue 2, Page 5848 - 5858

DOI: https://doij.org/10.10000/IJLMH.1110653

Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution -NonCommercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/), which permits remixing, adapting, and building upon the work for non-commercial use, provided the original work is properly cited.

Copyright

Copyright © IJLMH 2021