A Research Paper on Cryptography in Cloud Computing
- Version
- Download 13
- File Size 246.21 KB
- File Count 1
- Create Date 2 May 2025
- Last Updated 2 May 2025
A Research Paper on Cryptography in Cloud Computing
Authors:
Vishal Kumar Singh
Student (BBA)
Kalinga University, Naya Raipur, Raipur, C.G
Sameer Ranjan Sahu
Student (BBA)
Kalinga University, Naya Raipur, Raipur, C.G
Sudhanshu Patel
Student (BBA)
Kalinga University, Naya Raipur, Raipur, C.G
Ms. Shinki K Pandey
Assistant Professor,
Kalinga University, Naya Raipur, Raipur, C.G
ABSTRACT: - Cloud computing offers scalable and cost-effective solutions for data storage and processing, enabling organizations to access computing resources on demand. However, as data is transferred to and managed by third-party providers, concerns about security, privacy, and data integrity become critical.
Cryptography serves as a fundamental technology to address these challenges, ensuring that sensitive information remains protected throughout its lifecycle in the cloud.
Various cryptographic techniques are employed to secure data in cloud environments. Symmetric and asymmetric encryption algorithms safeguard data at rest and in transit, while more advanced methods like homomorphic encryption and searchable encryption allow secure computations and queries over encrypted data without compromising confidentiality.
Cryptographic methods also support essential functions like digital signatures and secure authentication, which help verify data integrity and user identity across distributed systems.
Despite its benefits, the implementation of cryptography in cloud computing presents challenges, particularly in key management, scalability, and performance. Effective solutions must include secure key generation, distribution, and storage, often involving trusted third parties or hardware security modules. Additionally, the rise of quantum computing poses potential threats to existing cryptographic algorithms, necessitating the exploration of post-quantum cryptography to secure future cloud infrastructures. As cloud technology evolves, cryptography will remain essential to building secure, trustworthy, and resilient cloud services.
Download