JOURNAL ARTICLE

Cryptographic Protocols for Secure Cloud Computing

S. A. AlhumraniJayaprakash Kar

Year: 2016 Journal:   International Journal of Security and Its Applications Vol: 10 (2)Pages: 301-310   Publisher: Science and Engineering Research Support Society

Abstract

In this paper, we review and analyze some well-known cryptographic protocols for encryption of data that establish a secure communication for clouds.Many protocols are there, which provides various security goals for cloud computing.We have briefed on Secure Shell Protocol, Internet Protocol Security (IPSec), Kerberos, Wired Equivalent Privacy (WEP) and WiFi Protected Access(WPA) and discuss how these have been applied in cloud for secure communication.Further, we present the commands used by these protocols, the various methods used to encrypt data (tunnels and channels for instance) and their advantages for clouds.

Keywords:
Cloud computing Computer science Cryptography Cryptographic protocol Computer security Cryptographic primitive Operating system

Metrics

8
Cited By
1.99
FWCI (Field Weighted Citation Impact)
8
Refs
0.91
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Exploring Cryptographic Paradigms for Secure Cloud Computing

B Rajalakshmi

Year: 2023 Vol: 12 Pages: 1290-1294
JOURNAL ARTICLE

Secure Protocols for Developed Cloud Computing

Thade Lakshmidevi

Journal:   International Journal of Computer Sciences and Engineering Year: 2019 Vol: 7 (12)Pages: 93-98
JOURNAL ARTICLE

Secure File Storage on Cloud Computing Using Cryptographic Algorithm

Shreya Sambhaji RanadiveHarshada Sanjay SawantJayesh Ekanath Pinjarkar

Journal:   International Journal for Research in Applied Science and Engineering Technology Year: 2022 Vol: 10 (4)Pages: 1803-1807
BOOK-CHAPTER

Secure Composition of Cryptographic Protocols

Vipul Goyal

Lecture notes in computer science Year: 2011 Pages: 71-71
© 2026 ScienceGate Book Chapters — All rights reserved.