Skip to main content

2024 | OriginalPaper | Buchkapitel

Empowering Security in Cloud Environment Using Encryption Technique

verfasst von : Mohammad Ali A. Hammoudeh, Aishah Flah, Noura Al Nassar, Wesam Al Rajhi, Renad Ibrahim

Erschienen in: Advances in Emerging Information and Communication Technology

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Saudi Vision 2030 policy, the Saudi government has placed a high value on technical advancement. Therefore, due to Vision 2030 by Saudi Arabia’s government that aims at diversifying its economy and creating more jobs in the country, the importance of the national cybersecurity policy is heightened. As a result, there is always a risk of data security breaches. The effective examination of cloud environment vulnerabilities was presented in many phases. Security measures for such files are lacking in both efficiency and ease of use. A hacker may readily take advantage of this. The most widely utilized technique for data protection is cryptography. Technology that is “practically resilient and impossible to assault” becomes critical. With the use of cryptographic algorithms, this study shows how to improve the security of data stored and shared over the network. Additionally, confidentiality, integrity, and availability (CIA) measures will be ensured in the cloud environment; the most challenging issue is how to protect data given that this information might be kept anywhere in the cloud. So, this study explains the cryptography techniques used by Cloud Service Providers (CSP). The idea of this work is to safeguard information using hybrid encryption while still being efficient using high-level language. This paper aids governments, businesses, and programmers in keeping their data secure in order that it can be utilized in delicate situations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat S.H. Murad, K.H. Rahouma, Hybrid cryptography for cloud security: Methodologies and designs, in Digital Transformation Technology, (Springer, 2021), pp. 129–140 S.H. Murad, K.H. Rahouma, Hybrid cryptography for cloud security: Methodologies and designs, in Digital Transformation Technology, (Springer, 2021), pp. 129–140
8.
Zurück zum Zitat S. Kaushik, A. Patel, Secure cloud data using hybrid cryptographic scheme (2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). IEEE, 2019), pp. 1–6 S. Kaushik, A. Patel, Secure cloud data using hybrid cryptographic scheme (2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). IEEE, 2019), pp. 1–6
Metadaten
Titel
Empowering Security in Cloud Environment Using Encryption Technique
verfasst von
Mohammad Ali A. Hammoudeh
Aishah Flah
Noura Al Nassar
Wesam Al Rajhi
Renad Ibrahim
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-53237-5_25

Premium Partner