JOURNAL ARTICLE

Exploring Cryptographic Paradigms for Secure Cloud Computing

Abstract

Cloud computing is a significant step forward for information technology since it enables elastic and immediate access to a variety of computer resources. However, protecting sensitive data and keeping computations private while it is stored on cloud should continue to be a key priority. Cryptographic paradigms have emerged as an essential resource for addressing these problems and establishing secure cloud computing environments. This study investigates the many cryptographic paradigms that might be utilized to make cloud storage more secure. In this article, various cryptographic paradigms, including homomorphic encryption, secure multiparty computing (MPC), attribute-based encryption (ABE), verifiable computation (VC), and privacy-preserving data mining, are examined, along with their advantages, disadvantages, and potential applications in the future. In addition, open research questions, possible directions for the future, and practical considerations regarding the deployment of cryptographic algorithms in the cloud are discussed. By providing a comprehensive understanding of cryptographic paradigms in secure cloud computing, this research article aims to assist cloud service providers, researchers, and practitioners in making educated decisions regarding selecting and implementing cryptographic techniques to enhance cloud security.

Keywords:
Cloud computing Computer science Cryptography Cryptographic primitive Computer security Homomorphic encryption Encryption Cloud computing security Cryptographic protocol Client-side encryption Key management On-the-fly encryption

Metrics

1
Cited By
0.26
FWCI (Field Weighted Citation Impact)
16
Refs
0.57
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Cryptographic Protocols for Secure Cloud Computing

S. A. AlhumraniJayaprakash Kar

Journal:   International Journal of Security and Its Applications Year: 2016 Vol: 10 (2)Pages: 301-310
JOURNAL ARTICLE

Secure File Storage on Cloud Computing Using Cryptographic Algorithm

Shreya Sambhaji RanadiveHarshada Sanjay SawantJayesh Ekanath Pinjarkar

Journal:   International Journal for Research in Applied Science and Engineering Technology Year: 2022 Vol: 10 (4)Pages: 1803-1807
JOURNAL ARTICLE

A Novel Cryptographic Protocol for Secure Data Sharing in Cloud Computing

G PradeepSathya Naryana PolaS. Ramamoorthy

Journal:   International Journal of Computer Engineering in Research Trends Year: 2023 Vol: 10 (11)Pages: 10-18
JOURNAL ARTICLE

Cloud Computing: Secure Transmission of High Definition Videos Using Cryptographic Approach

Anwar Basha.HSri SaiA SanjnahM Srimathi

Journal:   International Journal of Engineering & Technology Year: 2018 Vol: 7 (2.19)Pages: 94-94
© 2026 ScienceGate Book Chapters — All rights reserved.