Advanced Encryption Techniques for Database Security in Cloud Environments
DOI:
https://doi.org/10.32628/CSEIT241051048Keywords:
Cloud Database Security, Encryption Techniques, Key Management, Homomorphic Encryption, Quantum-Resistant AlgorithmsAbstract
This technical article explores advanced encryption techniques for enhancing database security in cloud environments, addressing the growing need for robust data protection as organizations increasingly migrate to cloud-based solutions. The article covers encryption standards such as AES-256, RSA, and Elliptic Curve Cryptography, as well as key management approaches using Hardware Security Modules (HSMs) and Key Management Services (KMS). It also delves into cutting-edge concepts like homomorphic encryption and quantum-resistant algorithms. The discussion encompasses performance optimization strategies and regulatory compliance considerations, providing a comprehensive overview of the current state and future trends in cloud database security.
Downloads
References
Emergen Resaerch, “Cloud-based data base security Market Report 2021-2028," Mar 2022. [Online]. Available: https://www.emergenresearch.com/industry-report/cloud-database-security-market
IBM Security, "Cost of a Data Breach Report 2024," 2024. [Online]. Available: https://www.ibm.com/reports/data-breach
Cloud Security Alliance, "Top Threats to Cloud Computing: Egregious Eleven Deep Dive," 2020. [Online]. Available: https://cloudsecurityalliance.org/artifacts/top-threats-egregious-11-deep-dive/
GeeksforGeeks, "Advanced Encryption Standard (AES)," July 2024. [Online]. Available: https://www.geeksforgeeks.org/advanced-encryption-standard-aes/
R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. [Online]. Available: https://dl.acm.org/doi/10.1145/359340.359342 DOI: https://doi.org/10.1145/359340.359342
D. J. Bernstein and T. Lange, "Faster Addition and Doubling on Elliptic Curves," in Advances in Cryptology – ASIACRYPT 2007, K. Kurosawa, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 29–50. [Online]. Available: https://eprint.iacr.org/2007/286.pdf DOI: https://doi.org/10.1007/978-3-540-76900-2_3
J. Luna, H. Ghani, D. Germanus, and N. Suri, "A security metrics framework for the Cloud," in 2011 IEEE International Conference on Security and Cryptography (SECRYPT), Seville, 2011, pp. 245-250. [Online]. Available: https://ieeexplore.ieee.org/document/6732394 DOI: https://doi.org/10.5220/0003446902450250
P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, Gaithersburg, MD, Special Publication 800-145, 2011. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf DOI: https://doi.org/10.6028/NIST.SP.800-145
C. Gentry, "A Fully Homomorphic Encryption Scheme," Ph.D. dissertation, Dept. Comp. Sci., Stanford Univ., Stanford, CA, USA, 2009. [Online]. Available: https://crypto.stanford.edu/craig/craig-thesis.pdf
K. Laine, "Simple Encrypted Arithmetic Library 2.3.1," Microsoft Research, 2017. [Online]. Available: https://docslib.org/doc/11642961/simple-encrypted-arithmetic-library-2-3-1#:~:text=In%202015%20the%20%EF%AC%81rst%20version%20of%20the%20Simple
National Institute of Standards and Technology, "Post-Quantum Cryptography," 2023. [Online]. Available: https://csrc.nist.gov/projects/post-quantum-cryptography
E. Politou, E. Alepis, and C. Patsakis, "Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions," Journal of Cybersecurity, vol. 4, no. 1, 2018. [Online]. Available: https://academic.oup.com/cybersecurity/article/4/1/tyy001/4954056 DOI: https://doi.org/10.1093/cybsec/tyy001
Cloud Security Alliance, "Cloud Controls Matrix v4," 2021. [Online]. Available: https://cloudsecurityalliance.org/research/cloud-controls-matrix
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.