IMAGES

  1. Research Paper On Cyber Security & Cryptography

    cloud cryptography research paper 2022

  2. Cloud cryptography Sequence.

    cloud cryptography research paper 2022

  3. (PDF) CRYPTOGRAPHY IN CLOUD COMPUTING FOR DATA SECURITY AND NETWORK

    cloud cryptography research paper 2022

  4. (PDF) Cloud Security using Hybrid Cryptography Algorithms

    cloud cryptography research paper 2022

  5. (PDF) Securing File Storage on the Cloud using Hybrid Cryptography

    cloud cryptography research paper 2022

  6. What Is Cloud Cryptography & How Does It Work

    cloud cryptography research paper 2022

VIDEO

  1. Digital Assets Update, 2Q23: Crypto, AI, CBDCs

  2. Collegebook ( Secure Cloud Storage Using Hybrid Cryptography

  3. Panel discussion: Emerging computing technologies in academia and industry

  4. Security using Elliptic Curve Cryptography ECC in Cloud

  5. Emerging Paradigms 1 & 2 + Post-Quantum Signatures 1 & 2 (Crypto 2023)

  6. Pretending to be a #Cloud... #TestRun

COMMENTS

  1. Implementation and Performance Analysis of Hybrid ...

    Cryptography plays a vital role to achieve that level of security required on the cloud. Hybrid cryptography takes the advantage of integrating more than one cryptographic algorithms to enhance the overall security and performance. In our research, we have proposed a comparative study for two-tier versus three-tier hybrid cryptographic models ...

  2. (PDF) Cloud Cryptography -A Security Aspect

    This. paper examines a variety of c ryptographic methods used b y. major cloud providers. It proposes an alternative algorithm. for encrypting data in transit from the user to the cloud in. order ...

  3. Cloud Computing Security using Cryptographic Algorithms

    This paper aims to present the survey of cloud computing security. A cloud computing security is defined so that it can help to clarify cloud security. Cloud computing has evolved to become an essential component of both current and future information technologies. This technology was created to be used in conjunction with the internet, and it includes features such as data storage, remote ...

  4. A Dynamic Four-Step Data Security Model for Data in Cloud ...

    Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data ...

  5. A systematic review of homomorphic encryption and its ...

    Cloud computing and cloud storage have contributed to a big shift in data processing and its use. Availability and accessibility of resources with the reduction of substantial work is one of the main reasons for the cloud revolution. With this cloud computing revolution, outsourcing applications are in great demand. The client uses the service by uploading their data to the cloud and finally ...

  6. Cloud Cryptography: User End Encryption

    Cloud computing has made the life of individual users and work of business corporations so much easier by providing them data storage services at very low costs. Individual users can store and access their data through shared cloud storage service anywhere anytime. Similarly, business corporation consumers of cloud computing can store, manage, process and access their big data with quite an ...

  7. Security and privacy protection in cloud computing ...

    7.1. Challenges. Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1.

  8. Cryptography

    Cryptography. , Volume 6, Issue 1 (March 2022) - 13 articles. Cover Story ( view full-size image ): Anonymous authentication systems have received the attention of many fields, as they secure user privacy. Both group signatures and ring signatures preserve user anonymity, allowing users to hide their identity within a group.

  9. Cloud Security using Hybrid Cryptography Algorithms

    Security in cloud computing is the emerging research issues nowadays. A lot of organization are moving from their traditional data storage to cloud storage, which provides an efficient way to access the data anywhere and anytime. But, the main hitch of organization to use cloud computing is data security. This paper proposed a multilevel cryptography based security system for cloud computing ...

  10. Enhancing Data Security for Cloud Computing Applications through

    Blockchain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to ...

  11. Cloud computing platform: Performance analysis of prominent

    The cryptographic method depends on their response time, confidentiality, bandwidth, and integrity. Furthermore, security is a significant factor in cloud computing for ensuring client data is placed on the safe mode in the cloud. Our research paper compares the efficiency, usage, and utility of available cryptography algorithms.

  12. Efficient Data Security Using Hybrid Cryptography on Cloud ...

    An asymmetric cryptosystem with hyper-elliptic curve cryptography is proposed for efficient data security, which provides secure data encryption as well as protected shield against data theft on the cloud. From the user's point of view, he believes the user has to access a high amount of cloud data in a protected way.

  13. A Review on Cloud Cryptography Techniques to Improve Security in E

    The paper provides analytical review and solution to strengthen the security in cloud database using cryptography, block chain and other technologies. ... Cryptography in cloud is a good and efficient way that allows securing the data and protection of sensitive data which is present over the cloud. ... 13 April 2022 ISBN Information ...

  14. A Review on Cryptography in Cloud Computing

    This paper focused on the basics of cloud computing and discussed various cryptography algorithms present in the existing work. Discover the world's research 25+ million members

  15. Secure File Storage in Cloud Using Hybrid Cryptography

    As customers regularly preserve delicate records with cloud garage corporations, however, the one's corporations additionally may be untrusted. In order to achieve security issues, Cryptography comes into the picture to maintain confidentiality. Using a single cryptography technique provides security, but it can easily be broken.

  16. [PDF] Cloud Cryptography: Theory, Practice and Future Research

    2015. TLDR. This paper proposes a new data sharing protocol for cloud computing by using a new cryptographic primitive named online/offline attribute-based proxy re-encryption and the transform key technique, and is the first one featuring with fine-grained access control, flexible sharing, data confidentiality, and minimum online computational ...

  17. PDF Doi: 10.17148/Iarjset.2021.8435 Cloud Cryptography

    The main aim of the research paper is to give a broad way description of cloud cryptography and its benefits. CLOUD: When you are employed in the software sector, you hear companies claiming their data is processed in the cloud more frequently than not. It may be misleading because the company itself wants to use terms that have little to do ...

  18. PDF ClOud CrypTOgraphy TO EnsurE sECurITy and prIVaCy In ClOud

    15 GLIMPSE - Journal of Computer Science • Vol. 13, No. 1, JANUARY-JUNE 2022 static encryption is used to encrypt the hash code. aEs uses a 128-bit block length. The following is a list of its rules: Initial Round Key Expansion - round keys have been introduced. sub Byte rounds - a non-uniform replacement

  19. Using Identity-Based Cryptography as a Foundation for an ...

    Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more effective application at a lower cost in a more satisfactory way. Health services data must therefore be kept as safe and secure as possible ...

  20. Cloud Cryptography: A Glance at Its Development

    The use of encryption methods to safeguard data that is processed or stored in the cloud is known as cloud cryptography, which is a crucial security mechanism for cloud computing. The use of encryption methods to safeguard data that is processed or stored in the cloud is known as cloud cryptography. As it helps to prevent unauthorised access, disclosure, modification, or destruction of data ...

  21. (PDF) A Review Paper on Cryptography

    Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...

  22. Cloud Cryptography

    Felix Bentil , Isaac Lartey, 2021, Cloud Cryptography - A Security Aspect, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 10, Issue 05 (May 2021), ... In cloud cryptography, there are two major types of encryption algorithms. ... Aws and Z.F. Mohamad. Use of Cryptography in Cloud Computing. Conference Paper ...

  23. The Cryptographer Who Ensures We Can Trust Our Computers

    But when I was looking for a good research question, everything felt incremental. So I started moving toward computer science. And cryptography was exactly what I was missing, because it deals with real-world problems. Today, cryptography is used everywhere. It is used to ensure that the messages we send are confidential and authentic.

  24. Evaluating the merits and constraints of cryptography ...

    Furthermore, in both 2021 and 2022, there is a lack of publications in the medical domain, whereas the four preceding years had such publications. ... The research papers are also arranged in ascending order according to these three categories. ... Enhanced cloud security using cryptography and steganography techniques. In: 2021 International ...

  25. A New Approach of Cryptography for Data Encryption and Decryption

    Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...

  26. Buildings

    As a representative of the scientific and technological achievements of the new era, the overall development of virtual reality (VR) technology is becoming increasingly refined, which provides new development ideas and technical support in the field of ancient building restoration and architectural heritage preservation. In this context, digital conservation and the practice of architectural ...

  27. The green IT revolution: A blueprint for CIOs

    Hyperscalers (also known as cloud service providers) and co-locators are investing significantly to become greener through measures such as buying green energy themselves and investing in ultra-efficient data centers with a PUE equal to or less than 1.10, compared with the average PUE of 1.57 for an on-premises data center. 8 "Uptime ...