Hybrid Cryptographic Protocols for Securing Sensitive Data in Cloud-Based Applications

Authors

  • Dr. B. Eswaran Rao Associate Professor Author

Keywords:

Hybrid Cryptographic Protocols, Cloud Security, Data Confidentiality, Data Integrity, Symmetric Encryption

Abstract

Since cloud-based applications are increasingly handling sensitive data across a variety of businesses, it has become increasingly important to ensure that robust data security is in place. A viable way to meet the one-of-a-kind security difficulties that cloud systems present is the utilization of hybrid cryptographic protocols, which mix different encryption algorithms. The purpose of hybrid cryptographic protocols is to improve data secrecy, integrity, and accessibility while simultaneously maximizing performance in cloud environments. These protocols offer multilayer security by using symmetric and asymmetric encryption in addition to powerful hashing algorithms. This allows them to strike a balance between computational efficiency and comprehensive protection against unauthorized access and data breaches. The results of the experiments show that hybrid protocols are successful in safeguarding data transfers and storage. In comparison to traditional approaches, hybrid protocols dramatically reduce the vulnerability to assaults. provides a method that is scalable, adaptable, and safe for the protection of data in cloud-based applications, which helps to the advancement of cloud security frameworks.

Downloads

Download data is not yet available.

References

Vijay Bhasker Reddy Bhimanapati, Dr. Punit Goel, & Anshika Aggarwal. (2024). Integrating Cloud Services with Mobile Applications for Seamless User Experience. Darpan International Research Analysis, 12(3), 252–268. https://doi.org/10.36676/dira.v12.i3.81

Charu Jain. (2024). Survey of Cloud Computing Security and Privacy Issues. Darpan International Research Analysis, 12(3), 160–171. https://doi.org/10.36676/dira.v12.i3.63

Sowmith Daram, Dr. Shakeb Khan, & Er. Om Goel. (2024). Network Functions in Cloud: Kubernetes Deployment Challenges. Global International Research Thoughts, 12(2), 34–46. https://doi.org/10.36676/girt.v12.i2.118

Tangudu, A., Jain, S., & Aggarwal, A. (2024). Best Practices for Ensuring Salesforce Application Security and Compliance. Journal of Quantum Science and Technology, 1(2), 88–101. https://doi.org/10.36676/jqst.v1.i2.18

Sachin Bhatt. (2024). Best Practices for Designing Scalable REST APIs in Cloud Environments. Journal of Sustainable Solutions, 1(4), 48–71. https://doi.org/10.36676/j.sust.sol.v1.i4.26

Downloads

Published

31-12-2024

How to Cite

Hybrid Cryptographic Protocols for Securing Sensitive Data in Cloud-Based Applications. (2024). Scientific Journal of Artificial Intelligence and Blockchain Technologies, 1(1), 5-9. https://sjaibt.org/index.php/j/article/view/2