Cryptography in Secure Cloud Computing Article Swipe
Related Concepts
Cloud computing
Cryptography
Computer science
Computer security
Operating system
Janaka Ishan Senarathna
,
Janaka Senarathna
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.20944/preprints202504.1371.v1
· OA: W4409587883
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.20944/preprints202504.1371.v1
· OA: W4409587883
Cloud computing offers cost efficiency and scalability but introduces significant security concerns related to data control. Cryptography addresses these concerns by ensuring data confidentiality, integrity, authenticity, and availability . This research document provides an in-depth analysis of cryptographic techniques in cloud computing, including symmetric and asymmetric encryption, homomorphic encryption, and post-quantum cryptography. It critically evaluates the strengths and limitations of current approaches, particularly in key management and data-in-use protection, and explores future directions and a proof of concept to enhance cloud security.
Related Topics
Finding more related topics…