Securing the Cloud: A Comprehensive Survey on Innovative Cloud Cryptography Techniques for Data Security

 Survey On Cloud Cryptography

Contributors of this paper:
  • Arun Kumar S Dept of Computer Science Engineering Presidency University Bengaluru, India
  • K.Laya Sree Dept of Computer Science Engineering Presidency University Bengaluru, India 
  • Drushti T R Dept of Computer Science Engineering Presidency University Bengaluru, India 

Abstract— Cloud computing has transformed the storage and accessibility of data, offering users convenience and scalability. However, ensuring data security and confidentiality in cloud environments remains a significant concern. Protecting sensitive data requires the use of cryptography. Through encryption techniques and cryptographic algorithms. This survey paper explores cloud cryptography, examining the evolution of encryption methods, cryptographic algorithms, and security challenges in cloud computing. Using the list of references as a guide, this investigation explores the encryption technology's application models in cloud environments and the design of a cryptography cloud framework to enhance data security. Additionally, it discusses the importance of staying updated on the latest cryptographic protocols to address emerging threats in cloud security. By analyzing the current landscape of cloud cryptography, The purpose of the survey is to present a thorough review of the opportunities, difficulties, and trends in the protection of data in cloud computing systems. 

Keywords— Cryptography, cloud security, cloud storage architecture 

I. INTRODUCTION 

With the immense measure of information moved consistently across the cloud and web, it is critical to guarantee that interlopers do not change or get the information we send and get. This has been a pressing issue for clients who value security and protection. Around the year 1993, an innovation called Cloud cryptography arose to give security to the information moving over the web. Web being the most fundamental component for cloud administrations, Cloud cryptography, the investigation of and execution of safety efforts is fascinating as well as interesting. Distributed computing has altered how information is put away, handled, and got to, offering unmatched adaptability and versatility to clients and associations. Be that as it may, the movement of delicate information to cloud conditions has raised critical worries with respect to information security and protection. In this unique circumstance, cryptography arises as a central device for guaranteeing the secrecy, uprightness, and credibility of information in the cloud. The references for this survey paper reveal insight into the advancing scene of cloud cryptography, accentuating the significance of strong encryption procedures and cryptographic calculations in shielding information in distributed computing conditions. Asmita A. Jagtap and Pratibha A. Tambewagh's overview on cloud cryptography [1] gives important bits of knowledge into the difficulties and open doors related to getting information in the cloud utilizing encryption techniques. This survey paper additionally gives experiences into the utilitarian models of cloud cryptography [1]. This survey paper plans to dig further into the domain of cloud cryptography, expanding upon the establishments spread out in the previously mentioned archives. By investigating the development of encryption innovations, cryptographic calculations, and security challenges in distributed computing, this paper tries to give a complete comprehension of the job of cryptography in guaranteeing information security in the cloud.

 II. LITERATURE REVIEW

 Distributed computing has altered how information is put away and gotten, offering various advantages like versatility, cost-proficiency, and adaptability. Be that as it may, the security of information put away in the cloud has turned into a main issue because of the gamble of unapproved access and information breaks. In light of these difficulties, cloud cryptography has arisen as an imperative part of information security in cloud conditions. Asmita A. Jagtap and Pratibha A. Tambewagh [1] directed a study on cloud cryptography, stressing the utilization of public and confidential keys for encoding and decoding information to keep up with information honesty. Their examination shed light on the meaning of information mystery and security in distributed computing, tending to the worries that make associations reluctant to embrace cloud advances. In addition, Shikhar Singh and Pawandeep Kaur [4][5] examined the security dangers related to putting away records in the cloud and proposed different encryption procedures, including deviated and symmetric encryption techniques like AES, DES, and RC-2 Encryption calculations. These strategies assume an urgent part in improving information security and moderating dangers in cloud-based applications. These papers also zeroed in on information encryption and unscrambling calculations involving key turns for upgrading information security in cloud frameworks. Their review highlighted the meaning of executing progressed cryptographic calculations to successfully protect information in cloud conditions. In a research paper by Rishav Chatterjee and Sharmistha Roy [6], the creators stressed the fundamental methodology of cryptography in distributed computing to guarantee information security. Their work featured the significance of carrying out hearty encryption systems to safeguard delicate data put away in the cloud from unapproved access. A few exploration studies have zeroed in on investigating different encryption and decoding procedures to guarantee the privacy and security of information in the cloud. For example, Jsv Sai Bhargav et al [7] featured the significance of putting away encoded data in the cloud to lessen the gamble of protection spillage, even though examining information the executives in such situations can challenge. All in all, the writing on cloud cryptography highlights the basic job of encryption methods in guaranteeing information privacy, honesty, and accessibility in distributed computing conditions. By utilizing progressed encryption strategies and vigorous safety efforts, associations can improve information security and moderate the dangers related to putting away touchy data in the cloud. This survey gives an exhaustive outline of the exploration directed in the field of cloud cryptography, featuring the significance of information security in distributed computing conditions and the job of encryption methods in protecting touchy data. 

III.EXISTING WORK 

A few examination studies have contributed fundamentally to the comprehension of cloud cryptography and its suggestions for information security in distributed computing conditions. Asmita A. Jagtap and Pratibha A. Tambewagh's study on cloud cryptography [1] gives a complete outline of encryption and unscrambling strategies used to get information in the cloud. Their work features the significance of public and confidential keys in keeping up with information honesty and secrecy in cloud conditions. Moreover, the study by Asmita A. Jagtap and Pratibha A. Tambewagh [1] gives a far-reaching outline of encryption and decoding strategies used to get information in the cloud. Their work features the significance of public and confidential keys in keeping up with information trustworthiness and secrecy in cloud conditions. In this specific situation, the Exploration and Plan of Cryptography Cloud framework[1] have likewise referenced the definite strides for planning a cryptographic help stream. There are around 9 moves toward completing the stream referenced in this paper. This exploration paper for the most part centres around carrying out a Virtual Cryptography Machine(VCM) which is a method that utilizes a blend of encryption, key administration and far-off validation to safeguard the secrecy and trustworthiness of virtual machines running on untrusted cloud stages. In basic words, VCM permits clients to check the reliability of the VM and the administrations they give, without depending on the cloud supplier or the specialist co-op.[9] Moreover, Shikhar Singh et al's. research on cloud cryptography [1][5] digs into the improvement of encryption strategies to protect information handled or put away in the cloud. Their research sheds light on the importance of encryption techniques like Triple Information Encryption Standard (3DES), Information Encryption Standard (DES), and High-level Encryption Standard (AES) to maintain the integrity and safety of data in cloud environments. By blending experiences from these connected works, this study paper expands after existing information and gives an extensive examination of patterns, difficulties, and potential open doors in cloud cryptography for upgrading information security in distributed computing conditions. Cryptography: Security Principles & Algorithms Utilizing codes, cryptography is a method of safeguarding communications and information so that only the intended recipients can decipher and process it. These days, any organization's priority should be system security. Every organization wants to keep its data safe from hackers. Cryptography's security principles are availability, non-repudiation, integrity, authenticity, confidentiality, and access control. These essential ideas and methods are known as the principles of cryptography, and they are used to encrypt communication and shield data from unauthorized users. [7] Although there are many different cryptographic methods in use, they can generally be divided into three groups: hash functions, symmetric key cryptography, and asymmetric key cryptography. Every category in the cryptographic environment has a crucial function to perform. Symmetric Key Algorithm: Symmetric key cryptography is a synonym for private key cryptography. Here one person keeps a secret key and the same key will be used to encode and decode the message. If there is a need for private key encryption to transmit the encrypted message between two people, a backup of the key must be made accessible to both the sender and the recipient. A shared secret key is used by this kind of cryptographic technology for both encryption and decryption.[7] Asymmetric Key Algorithm: Public key cryptography is another acronym for asymmetric key cryptography. Data is encrypted and decrypted using two keys. The keys consist of a private key that the sender keeps private and a public key that can be shared with anybody. In this case, the data is encrypted by the sender using the recipient's public key, and it is decrypted by the recipient using their private key.[7] Hash functions: This approach does not use a key; instead, it calculates a hash value based on the plain text that is fixed in length, making it difficult to reconstruct the plain text's contents. Hashing functions are frequently utilized in operating systems to encrypt passwords. They are found in practically all applications related to information security and are extremely beneficial.[7] Cloud Computing: Instead of depending on a local hard drive or server, cloud computing involves the storing and retrieval of data and programs on remote servers accessed over the internet. It is also known as Internet-based computing, a technology in which users access resources as a service via the Internet. Files, photos, papers, and other types of data can all be kept on cloud storage platforms. Cloud computing can be used for a variety of tasks, including data storage, backup, and recovery; on-demand software delivery; and the creation of new applications and services. [2] In recent years, cloud computing has become the norm for all types of organizations and businesses, from startups to multinational corporations, as a result of the greater data capacity and lower maintenance requirements. The cloud service provider stores a lot of data. Cloud companies offer services based on the "Pay and use" premise; users only need to pay for the services they use. This explains the drastic shift that businesses have made from using their on-premises servers to using cloud services. 

The cloud-deployment models into 4 broad categories

 1. Public Cloud: A cloud deployment approach in which a third-party cloud service provider offers cloud services online. Resources like servers and storage are shared by several clients, and these services are open to the broader public. Customers only pay for the resources they use, providing scalability and flexibility without requiring an initial infrastructure investment. 

2. Private Cloud: A style of cloud deployment in which cloud services are offered inside a specific infrastructure, either hosted by a third party or on-site. Compared to public cloud alternatives, this infrastructure offers more control, security, and flexibility because it is utilized only by one enterprise. Organizations with special security, compliance, or performance requirements might invest in private clouds. Fig1 Various Cloud Deployment Models



 3. Hybrid Cloud: An approach to cloud deployment that allows apps and data to be shared between public and private clouds by fusing aspects of each. Public and private cloud resources are available for use by organizations, depending on their unique requirements, workload, and budget. Hybrid clouds allow you to keep control over sensitive data while taking advantage of existing infrastructure investments, flexibility, and scalability.

 4. Community Cloud: A cloud deployment model in which multiple firms share infrastructure to address shared issues, like industry-specific requirements or regulatory compliance. These groups share expenses and benefits as they work together to set up and manage the cloud infrastructure. Community clouds cater to the particular requirements of particular user communities while providing the benefits of pooled resources

Cryptographic Cloud Architecture: Cryptographic cloud storage architecture entails a system framework where data stored in the cloud undergoes encryption using cryptographic methods to ensure its confidentiality, integrity, and authenticity. This design typically involves employing encryption algorithms to encode data before transferring it to the cloud, along with decryption keys for accessing and decoding the data when necessary. This approach establishes a secure mechanism for storing sensitive information in the cloud, safeguarding it against unauthorized access or manipulation. Cloud deployment models Public Cloud Private Cloud Community Cloud Hybrid Cloud. [3]



 Kamara & Lauter et al. [3] suggested the implementation of a digital personal storage solution capable of meeting diverse requirements such as privacy, integrity, and authentication. Encrypting files stored in the cloud addresses most of these needs. However, when collaboration technology is involved, this encryption leads to complexity in search operations and real-time updates to files. 

IV.CONCLUSION 

Cloud computing is a rapidly developing technology that has become a new trend. Many companies and organisations are migrating to the cloud. As it offers robust security measures, addressing key management challenges, optimizing performance. Cloud infrastructure platform has the main issue of distribution of information. The cloud contains numerous security algorithms that can be used such as DES, Triple-DES, and AES which are examples of symmetric algorithms. Cryptography can be used for cloud security in a variety of ways. It will be utilized for cloud data access control, Secure data storage, cloud knowledge authorization and authentication, and cloud data trust management. In this paper, various cryptographic algorithms that are used in cloud computing are discussed and some of the algorithms. Cryptography is vital in the cloud to safeguard confidential data and guarantee adherence to legal requirements. Cloud cryptography is a standard for encryption that protects data kept on the cloud. To secure data from breaches, hacks, and malware threats, a variety of security measures are put in place. Users can access shared cloud services safely since all data hosted by cloud providers is encrypted. Sensitive data is efficiently secured without information being hindered. Several establishments establish diverse cryptographic techniques for their cloud computing to maintain an equilibrium between security and effectiveness. 

V. FUTURE SCOPE 

The continuous investigation of distributed storage insurance presents a dynamic and exploratory scene. Among the recognized worries are the defending of client information and the strength of programming frameworks. Cloud suppliers offer a scope of approaches and procedures for insurance. Acquainting an assessment structure points to address the test of choosing a cloud supplier in light of client security rules. Looking forward, cloud cryptography is ready to turn into a conspicuous issue. Given the pervasive movement of data sets, programming, and equipment to the cloud, driven by its proficiency in space, time, cost, and the board, guaranteeing hearty cryptographic measures will be basic.


 VI.REFERENCES 

[1] Asmita A. Jagtap, Pratibha A. Tambewagh. "Survey on Cloud Cryptography." Vol. 10, Issue 5, May 2021 

[2] CLOUD CRYPTOGRAPHY Gayatri Chandrakant Jadhav, Komal Ishwara Awale, Ankita Annaso Patil, Kalpana N. Rode, International Journal of Research Publication and Reviews, Vol 3, no 6, pp 2200-2202, June 2022

 [3] Cloud Cryptography to Ensure Security and Privacy in Cloud ,GLIMPSE - Journal of Computer Science • Vol. 13, No. 1, JANUARY-JUNE 2022

 [4]Cloud Cryptography: A Glance at Its Development Shikhar Singh, Mahendra Sharma, Shreyansh Chaudhary, Parth Jain, Suraksha Shetty, Volume 5, Issue 4, JulyAugust 2023 

[5] Cloud cryptography Pawandeep Kaur, Devi Sowjanya, Jagadeesh, Indramani Sharma, International Advanced Research Journal in Science, Engineering and Technology Vol. 8, Issue 4, April 2021 

[6] Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud, International Journal of Engineering Science and Computing, May 2017 

[7] A Review on Cryptography in Cloud Computing, International Journal of Scientific Research in Computer Science Engineering and Information Technology · December 2020 

[8] Comparison of Cryptographic Algorithms in Cloud and Local Environment using Quantum Cryptography–G. Murali, R. Sivaram Prasad, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)

 [9] Research and design of cryptography cloud framework Authors: Sun Lei, Zhao Kun, Sun Ruichen, Li Shuai, IEEE 2018 

[10] A Cryptography API: Next Generation Key Storage Provider for Cryptography in the Cloud-Iulian Aciobanitei, Paul Danut Urian, Mihai Pura, IEEE 2018

Comments

Popular posts from this blog

Shopping portal using Servlets

Trade Planner-A full stack application

Savoury Secrets