Hybrid Cryptographic Protocols for Securing Sensitive Data in Cloud-Based Applications
Keywords:
Hybrid Cryptographic Protocols, Cloud Security, Data Confidentiality, Data Integrity, Symmetric EncryptionAbstract
Since cloud-based applications are increasingly handling sensitive data across a variety of businesses, it has become increasingly important to ensure that robust data security is in place. A viable way to meet the one-of-a-kind security difficulties that cloud systems present is the utilization of hybrid cryptographic protocols, which mix different encryption algorithms. The purpose of hybrid cryptographic protocols is to improve data secrecy, integrity, and accessibility while simultaneously maximizing performance in cloud environments. These protocols offer multilayer security by using symmetric and asymmetric encryption in addition to powerful hashing algorithms. This allows them to strike a balance between computational efficiency and comprehensive protection against unauthorized access and data breaches. The results of the experiments show that hybrid protocols are successful in safeguarding data transfers and storage. In comparison to traditional approaches, hybrid protocols dramatically reduce the vulnerability to assaults. provides a method that is scalable, adaptable, and safe for the protection of data in cloud-based applications, which helps to the advancement of cloud security frameworks.
Downloads
References
Vijay Bhasker Reddy Bhimanapati, Dr. Punit Goel, & Anshika Aggarwal. (2024). Integrating Cloud Services with Mobile Applications for Seamless User Experience. Darpan International Research Analysis, 12(3), 252–268. https://doi.org/10.36676/dira.v12.i3.81
Charu Jain. (2024). Survey of Cloud Computing Security and Privacy Issues. Darpan International Research Analysis, 12(3), 160–171. https://doi.org/10.36676/dira.v12.i3.63
Sowmith Daram, Dr. Shakeb Khan, & Er. Om Goel. (2024). Network Functions in Cloud: Kubernetes Deployment Challenges. Global International Research Thoughts, 12(2), 34–46. https://doi.org/10.36676/girt.v12.i2.118
Tangudu, A., Jain, S., & Aggarwal, A. (2024). Best Practices for Ensuring Salesforce Application Security and Compliance. Journal of Quantum Science and Technology, 1(2), 88–101. https://doi.org/10.36676/jqst.v1.i2.18
Sachin Bhatt. (2024). Best Practices for Designing Scalable REST APIs in Cloud Environments. Journal of Sustainable Solutions, 1(4), 48–71. https://doi.org/10.36676/j.sust.sol.v1.i4.26
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Scientific Journal of Artificial Intelligence and Blockchain Technologies

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.