Study of Cryptography in Cloud Computing

سال انتشار: 1402
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 54

فایل این مقاله در 11 صفحه با فرمت PDF و WORD قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

TETSC01_008

تاریخ نمایه سازی: 6 اسفند 1402

چکیده مقاله:

If all of the top levels of security fail, the final and most critical tier, data security, must not fail. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined. However, increasing security reduces the performance of the system and usability. This paper addresses the fundamentals of cloud computing as well as its key challenge: security. This paper examines a variety of cryptographic methods used by major cloud providers. It proposes an alternative algorithm for encrypting data in transit from the user to the cloud in order to ensure data security and defend against Man-in-the- Middle (MitM) attacks like sniffing. The paper concludes by urging further study into the proposed cryptography algorithm in order to ensure data protection and privacy in all three data states.

نویسندگان

Asif Hujilin

Research Scholar University of Technology, Medical Sciences,

Aklipar Husainpilo

Associate Professor Department of Computer Science&Information Technology,