Assuring encryption and security in cloud infrastructure

Sachan, Ram Chandra and Poddar, Sanjay and Sharma, Nandan and Moka, Anil Kumar and Lagisetty, Sudheer Kumar (2025) Assuring encryption and security in cloud infrastructure. World Journal of Advanced Engineering Technology and Sciences, 14 (3). 067-076. ISSN 2582-8266

[thumbnail of WJAETS-2025-0091.pdf] Article PDF
WJAETS-2025-0091.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 695kB)

Abstract

The way organizations work has been totally changed by cloud computing, which gives versatile and reasonable arrangements for designing, implementing and overseeing applications. Critical information movement to the cloud has raised genuine security issues, particularly with respect to information judgment, privacy, and administrative compliance. Encryption is one of the most utilized mechanisms to ensure information security in cloud infrastructure. By changing information into a schema that can be pursued by authorized parties with the correct decryption keys, encryption secures information both in transit and at rest. Regardless of its benefits, encryption in cloud computing presents critical challenges, especially with respect to key administration, administrative compliance, and execution. This unique looks at the complementary parts of compliance and encryption in cloud computing, counting a rundown of the foremost later encryption developments, legitimate necessities and noteworthy industry challenges. Strong encryption strategies are vital to anticipate unauthorized get to cloud-based administrations that store a combination of open and private information, as well as to comply with legitimate prerequisites set by controls such as the Common Information Security Control, Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard. Various enactment require encryption as a component of their information security commitments, which pushes cloud benefit suppliers to form ever-more-complex encryption arrangements. Key administration issues include to the complexity of utilizing encryption. Organizations utilizing cloud situations need to strike a compromise between giving CSPs duty over key management and keeping control over their encryption keys. Administrations are becoming increasingly prevalent as ways to decrease these threats.

Item Type: Article
Official URL: https://doi.org/10.30574/wjaets.2025.14.3.0091
Uncontrolled Keywords: Cloud Computing; Encryption; Compliance; Data Security; Key Management; Homomorphic Encryption; Attribute-Based Encryption; AES, Regulatory Requirements; Data Privacy
Depositing User: Editor Engineering Section
Date Deposited: 25 Jul 2025 16:11
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/2481