Affiliation:
1. Manipal University Jaipur
Abstract
Cloud computing, a next-generation computing technique, enables extremely flexible, scalable, and cost-effective computing that is available on demand. Organizations can expect increased agility, improved business interaction, and continuity as a result of cloud technologies. However, with increased demand, the need for data confidentiality, integrity, and availability has become one of the most crucial challenges in cloud computing. Various cryptographic approaches are employed in the cloud to guarantee that these needs are met, such as safeguarding against data breaches and malicious attacks. This paper outlines cloud infrastructure, cloud security requirements, and their challenges. We then present an overview of various cryptographic techniques such as AES, DES, RSA, etc. that have been used to ensure cloud security. We also reviewed hybrid algorithms proposed and implemented by various authors and mentioned their advantages and shortcomings.
Publisher
Trans Tech Publications Ltd