IIUM Repository

Design of protection software using some cryptosystems for cloud database files

Jasim, Khalid F and Zeki, Akram M. (2024) Design of protection software using some cryptosystems for cloud database files. Cihan University-Erbil Scientific Journal (CUESJ), 8 (1). pp. 70-79. ISSN 2519-6979 E-ISSN 2707-6377

[img] PDF - Published Version
Restricted to Repository staff only

Download (1MB) | Request a copy

Abstract

The security of cloud databases may be a basic concern for organizations as they store and manage expansive volumes of delicate information within the cloud. Cryptosystems played an essential part in securing information privacy and integrity in these situations. This paper gives an in-depth investigation of the utilization of cryptosystems for cloud database security. The paper starts by talking about the foundation and importance of cloud database security, highlighting the expanding requirement for strong information security measures. A comprehensive study reviewed and investigated the current state of research in this space, distinguishing key progressions and challenges. The paper at that point digs into the execution of cryptosystems in cloud databases, looking at their execution and trade-offs. Besides, rising patterns and advances for improving cloud database security, such as multi-factor confirmation, homomorphic encryption, and blockchain, are discussed. The paper moreover recognizes different inquiries about openings and future headings within the field, counting various encryption methods, execution optimization, key administration, convenience enhancements, compliance contemplations, and integration with rising advances. Furthermore, we proposed encryption software for file protection, the software designed based on symmetric and asymmetric cryptosystems. The proposed software can be adapted for file protection in cloud database security. In conclusion, the paper emphasizes the significance of cryptosystems for cloud database security and underscores the requirement for continuous inquiry about and collaboration to address challenges and drive development in this zone.

Item Type: Article (Journal)
Uncontrolled Keywords: Cloud Database Security Data Confidentiality Symmetric Encryption Asymmetric Encryption Encryption Algorithms
Subjects: T Technology > T Technology (General)
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System

Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology
Depositing User: Akram M Zeki
Date Deposited: 08 Jan 2025 17:05
Last Modified: 08 Jan 2025 17:05
URI: http://irep.iium.edu.my/id/eprint/117405

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year