CFP last date
20 February 2025
Reseach Article

Advanced Encryption Techniques for Securing Data Transfer in Cloud Computing: A Comparative Analysis of Classical and Quantum-Resistant Methods

by Koushik Kumar Ganeeb, Vivekananda Jayaram, Manjunatha Sughaturu Krishnappa, Pankaj Gupta, Akshay Nagpal, Amey Ram Banarse, Seema G Aarella
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 48
Year of Publication: 2024
Authors: Koushik Kumar Ganeeb, Vivekananda Jayaram, Manjunatha Sughaturu Krishnappa, Pankaj Gupta, Akshay Nagpal, Amey Ram Banarse, Seema G Aarella
10.5120/ijca2024924135

Koushik Kumar Ganeeb, Vivekananda Jayaram, Manjunatha Sughaturu Krishnappa, Pankaj Gupta, Akshay Nagpal, Amey Ram Banarse, Seema G Aarella . Advanced Encryption Techniques for Securing Data Transfer in Cloud Computing: A Comparative Analysis of Classical and Quantum-Resistant Methods. International Journal of Computer Applications. 186, 48 ( Nov 2024), 1-9. DOI=10.5120/ijca2024924135

@article{ 10.5120/ijca2024924135,
author = { Koushik Kumar Ganeeb, Vivekananda Jayaram, Manjunatha Sughaturu Krishnappa, Pankaj Gupta, Akshay Nagpal, Amey Ram Banarse, Seema G Aarella },
title = { Advanced Encryption Techniques for Securing Data Transfer in Cloud Computing: A Comparative Analysis of Classical and Quantum-Resistant Methods },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2024 },
volume = { 186 },
number = { 48 },
month = { Nov },
year = { 2024 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number48/advanced-encryption-techniques-for-securing-data-transfer-in-cloud-computing-a-comparative-analysis-of-classical-and-quantum-resistant-methods/ },
doi = { 10.5120/ijca2024924135 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-11-27T00:39:23.285667+05:30
%A Koushik Kumar Ganeeb
%A Vivekananda Jayaram
%A Manjunatha Sughaturu Krishnappa
%A Pankaj Gupta
%A Akshay Nagpal
%A Amey Ram Banarse
%A Seema G Aarella
%T Advanced Encryption Techniques for Securing Data Transfer in Cloud Computing: A Comparative Analysis of Classical and Quantum-Resistant Methods
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 48
%P 1-9
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As cloud computing becomes increasingly prevalent, the need for robust security measures to protect data during transfer is critical. This paper provides a thorough examination of advanced encryption techniques designed to ensure secure data transmission in cloud environments. Traditional methods, including Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA), are evaluated alongside emerging approaches such as homomorphic encryption and quantum key distribution (QKD). These techniques are assessed based on their security strength, performance, and suitability in addressing contemporary challenges, particularly those posed by quantum computing. The analysis highlights the practical applications of these methods in cloud security and their potential for future advancements in securing data transfers. The insights provided will aid in developing resilient encryption strategies to protect sensitive information in the evolving landscape of cloud computing.

References
  1. S. Al-Kuwari, O. Al-Sakran, and J. Al-Muhtadi. Comparative analysis of aes and rsa algorithms in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA), 11(2):65–72, 2020.
  2. M. N. Alenezi, H. Alabdulrazzaq, and N. Q. Mohammad. Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2):105–115, Aug. 2020.
  3. Moncef Amara and Amar Siad. Elliptic curve cryptography and its applications. In International Workshop on Systems, Signal Processing and their Applications (WOSSPA), pages 247–250, 2011.
  4. Dan Boneh, Amit Sahai, and Brent Waters. Functional encryption: Definitions and challenges. In Yuval Ishai, editor, Theory of Cryptography, pages 253–273, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg.
  5. S. Chatterjee and P. Sarkar. Identity-Based Encryption. SpringerLink: B¨ucher. Springer US, 2011.
  6. S. Cui, J. Zhang, and X. Wu. Practical challenges and solutions in homomorphic encryption. Journal of Cryptographic Engineering, 9(3):183–200, 2019.
  7. C. Gentry. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pages 169–178, 2009.
  8. Don Johnson, Alfred Menezes, and Scott Vanstone. The elliptic curve digital signature algorithm (ecdsa). International Journal of Information Security, 1(1):36–63, Aug 2001.
  9. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, revised edition, 2019.
  10. Kundan Munjal and Rekha Bhatia. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex Intelligent Systems, 9(4):3759–3786, Aug 2023.
  11. J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback. Report on the development of the advanced encryption standard (aes). Journal of Research of the National Institute of Standards and Technology, 106(3):511– 577, Jun 2001.
  12. Petar Radanliev. Artificial intelligence and quantum cryptography. Journal of Analytical Science and Technology, 15(1):4, Feb 2024.
  13. Hengki Tamando Sihotang, Syahril Efendi, Elvyawati M Zamzami, and Herman Mawengkang. Design and implementation of rivest shamir adleman’s (rsa) cryptography algorithm in text file data security. Journal of Physics: Conference Series, 1641(1):012042, nov 2020.
  14. D. M. Tank, A. Ganatra, Y. P. Kosta, and C. K. Bhensdadia. Speeding etl processing in data warehouses using highperformance joins for changed data capture (cdc). In Proceedings of the IEEE International Conference, 2010.
  15. Urs Wagner and Thomas Lugrin. Hash Functions, pages 21– 24. Springer Nature Switzerland, Cham, 2023.
  16. Xiaoyun Wang, Guangwu Xu, and Yang Yu. Lattice-based cryptography: A survey. Chinese Annals of Mathematics, Series B, 44(6):945–960, Nov 2023.
  17. T.Williams. Challenges in implementing ai-powered crm systems. Journal of Information Systems, 2022.
  18. Yuhan Yan. The overview of elliptic curve cryptography (ecc). Journal of Physics: Conference Series, 2386(1):012019, Dec 2022.
  19. V´ıctor Zapatero, Tim van Leent, Rotem Arnon-Friedman, Wen-Zhao Liu, Qiang Zhang, Harald Weinfurter, and Marcos Curty. Advances in device-independent quantum key distribution. npj Quantum Information, 9(1):10, Feb 2023.
  20. Chuan Zhao, Shengnan Zhao, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, and Yu an Tan. Secure multi-party computation: Theory, practice and applications. Information Sciences, 476:357–372, 2019.
Index Terms

Computer Science
Information Sciences

Keywords

Secure Data Transfer Cyber Security Data Integration Distributed Systems Encryption Digital Signatures Data Confidentiality Cryptographic Techniques