Advanced Encryption Techniques for Database Security in Cloud Environments

Authors

  • Sachin Gupta Paramount Pictures, USA Author

DOI:

https://doi.org/10.32628/CSEIT241051048

Keywords:

Cloud Database Security, Encryption Techniques, Key Management, Homomorphic Encryption, Quantum-Resistant Algorithms

Abstract

This technical article explores advanced encryption techniques for enhancing database security in cloud environments, addressing the growing need for robust data protection as organizations increasingly migrate to cloud-based solutions. The article covers encryption standards such as AES-256, RSA, and Elliptic Curve Cryptography, as well as key management approaches using Hardware Security Modules (HSMs) and Key Management Services (KMS). It also delves into cutting-edge concepts like homomorphic encryption and quantum-resistant algorithms. The discussion encompasses performance optimization strategies and regulatory compliance considerations, providing a comprehensive overview of the current state and future trends in cloud database security.

Downloads

Download data is not yet available.

References

Emergen Resaerch, “Cloud-based data base security Market Report 2021-2028," Mar 2022. [Online]. Available: https://www.emergenresearch.com/industry-report/cloud-database-security-market

IBM Security, "Cost of a Data Breach Report 2024," 2024. [Online]. Available: https://www.ibm.com/reports/data-breach

Cloud Security Alliance, "Top Threats to Cloud Computing: Egregious Eleven Deep Dive," 2020. [Online]. Available: https://cloudsecurityalliance.org/artifacts/top-threats-egregious-11-deep-dive/

GeeksforGeeks, "Advanced Encryption Standard (AES)," July 2024. [Online]. Available: https://www.geeksforgeeks.org/advanced-encryption-standard-aes/

R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. [Online]. Available: https://dl.acm.org/doi/10.1145/359340.359342 DOI: https://doi.org/10.1145/359340.359342

D. J. Bernstein and T. Lange, "Faster Addition and Doubling on Elliptic Curves," in Advances in Cryptology – ASIACRYPT 2007, K. Kurosawa, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 29–50. [Online]. Available: https://eprint.iacr.org/2007/286.pdf DOI: https://doi.org/10.1007/978-3-540-76900-2_3

J. Luna, H. Ghani, D. Germanus, and N. Suri, "A security metrics framework for the Cloud," in 2011 IEEE International Conference on Security and Cryptography (SECRYPT), Seville, 2011, pp. 245-250. [Online]. Available: https://ieeexplore.ieee.org/document/6732394 DOI: https://doi.org/10.5220/0003446902450250

P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, Gaithersburg, MD, Special Publication 800-145, 2011. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf DOI: https://doi.org/10.6028/NIST.SP.800-145

C. Gentry, "A Fully Homomorphic Encryption Scheme," Ph.D. dissertation, Dept. Comp. Sci., Stanford Univ., Stanford, CA, USA, 2009. [Online]. Available: https://crypto.stanford.edu/craig/craig-thesis.pdf

K. Laine, "Simple Encrypted Arithmetic Library 2.3.1," Microsoft Research, 2017. [Online]. Available: https://docslib.org/doc/11642961/simple-encrypted-arithmetic-library-2-3-1#:~:text=In%202015%20the%20%EF%AC%81rst%20version%20of%20the%20Simple

National Institute of Standards and Technology, "Post-Quantum Cryptography," 2023. [Online]. Available: https://csrc.nist.gov/projects/post-quantum-cryptography

E. Politou, E. Alepis, and C. Patsakis, "Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions," Journal of Cybersecurity, vol. 4, no. 1, 2018. [Online]. Available: https://academic.oup.com/cybersecurity/article/4/1/tyy001/4954056 DOI: https://doi.org/10.1093/cybsec/tyy001

Cloud Security Alliance, "Cloud Controls Matrix v4," 2021. [Online]. Available: https://cloudsecurityalliance.org/research/cloud-controls-matrix

Downloads

Published

01-11-2024

Issue

Section

Research Articles

Similar Articles

1-10 of 406

You may also start an advanced similarity search for this article.