Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing. Cloud storage is popular among individuals and businesses because it reduces cos...

Full description

Saved in:
Bibliographic Details
Main Authors: K. Sasikumar, Sivakumar Nagarajan
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10493043/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849731052812107776
author K. Sasikumar
Sivakumar Nagarajan
author_facet K. Sasikumar
Sivakumar Nagarajan
author_sort K. Sasikumar
collection DOAJ
description Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing. Cloud storage is popular among individuals and businesses because it reduces cost, increases productivity, boosts performance, and improves security. However, cloud computing comes with security risks as data are stored with third-party providers, and Internet access limits visibility and control. Effective data security and data protection are key issues compared with traditional on-premise computing. There are several methods for ensuring data security in the cloud, of which cryptography is the most important. Cryptography offers a range of security features including authentication, confidentiality, integrity, and availability. However, a thorough examination of the different cryptography methods in a single study is lacking. This study comprehensively examined different cryptography methods, including deoxyribose nucleic acid (DNA), elliptic curve, homomorphic, hybrid, lightweight, and novel methods. The analysis addresses their methodology, algorithms, results, applications, and limitations and provides valuable suggestions for data security in the cloud. This paper proposes the use of elliptic curve cryptography (ECC) to ensure safe communication and lightweight cryptography for Internet of Things (IoT) devices with limited resources. This emphasizes the benefit of combining asymmetric security with symmetric efficiency in hybrid cryptography.
format Article
id doaj-art-ba46f89f5fae4776b9f5f96204fc48a5
institution DOAJ
issn 2169-3536
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-ba46f89f5fae4776b9f5f96204fc48a52025-08-20T03:08:40ZengIEEEIEEE Access2169-35362024-01-0112523255235110.1109/ACCESS.2024.338544910493043Comprehensive Review and Analysis of Cryptography Techniques in Cloud ComputingK. Sasikumar0https://orcid.org/0009-0007-8844-6654Sivakumar Nagarajan1https://orcid.org/0000-0002-8945-6412School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, IndiaSchool of Computer Science and Engineering, Vellore Institute of Technology, Vellore, IndiaCloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing. Cloud storage is popular among individuals and businesses because it reduces cost, increases productivity, boosts performance, and improves security. However, cloud computing comes with security risks as data are stored with third-party providers, and Internet access limits visibility and control. Effective data security and data protection are key issues compared with traditional on-premise computing. There are several methods for ensuring data security in the cloud, of which cryptography is the most important. Cryptography offers a range of security features including authentication, confidentiality, integrity, and availability. However, a thorough examination of the different cryptography methods in a single study is lacking. This study comprehensively examined different cryptography methods, including deoxyribose nucleic acid (DNA), elliptic curve, homomorphic, hybrid, lightweight, and novel methods. The analysis addresses their methodology, algorithms, results, applications, and limitations and provides valuable suggestions for data security in the cloud. This paper proposes the use of elliptic curve cryptography (ECC) to ensure safe communication and lightweight cryptography for Internet of Things (IoT) devices with limited resources. This emphasizes the benefit of combining asymmetric security with symmetric efficiency in hybrid cryptography.https://ieeexplore.ieee.org/document/10493043/Cloud computingdata securityprivacyintegritycryptographyDNA
spellingShingle K. Sasikumar
Sivakumar Nagarajan
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
IEEE Access
Cloud computing
data security
privacy
integrity
cryptography
DNA
title Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
title_full Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
title_fullStr Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
title_full_unstemmed Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
title_short Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
title_sort comprehensive review and analysis of cryptography techniques in cloud computing
topic Cloud computing
data security
privacy
integrity
cryptography
DNA
url https://ieeexplore.ieee.org/document/10493043/
work_keys_str_mv AT ksasikumar comprehensivereviewandanalysisofcryptographytechniquesincloudcomputing
AT sivakumarnagarajan comprehensivereviewandanalysisofcryptographytechniquesincloudcomputing