Design for The Purpose of Protecting Encryption Systems and Cloud Database Files

Authors

  • Ali Mohammed Abdul Majeed Babylon Technical Institute AL-Furat-AL Awsat Technical University, 51051 Babylon, Iraq

Keywords:

encryption techniques, symmetric and asymmetric encryption, and data confidentiality

Abstract

Cloud database security might be an essential question for cloud databases since enterprises store and process huge volumes of sensitive data in the cloud. In several situations, cryptosystems were essential to maintaining the data’s integrity and secrecy. This study has comprehensively investigated the application of cryptosystems for the cloud database security. The paper first discusses the premise and importance of cloud database security, with a focus on the increasing demand for advanced information security schemes. The literature is critically examined in terms of major achievements and challenges in this field. Following this, we present a study on the application of cryptosystems to cloud databases, including their trade-offs and execution. It also discusses possible trends and developments on these lines for improving cloud database security, such block chain, holomorphic encryption, multi-factor authentication. Furthermore, the paper identifies several questions with regard to possibilities and future directions in the area encompassing novel encryption schemes, execution optimization, key management, and usability enhancements, regulatory issues, as well as integration with emerging technologies. Also, we have proposed a encryption based file security software using. The proposed solution can be adapted to protect files in cloud database security. The study ends with the implication that the significance of cryptosystems for cloud database security, such as in the case of this research, should be a priority in future research and development efforts to overcome constraints and stimulate growth in this area.

References

P. Arjun and R. Komar, “New developments in cloud computing: A thorough examination of service and deployment approaches for increased security, scalability, and flexibility,” Intelligent Systems and Applied Data Science Journal, vol. 1, no. 1, pp. 20–28, 2023.

N. Kansara and H. B. Patel, “A comparative analysis of cloud computing deployment models,” International Journal of Innovative Research in Computer Science and Technology, vol. 9, no. 2, pp. 45–50, 2021.

A. Alharbi, B. Alouffi, M. Hasnain, W. Alosaimi, H. Alyami, and M. Ayaz, “An organized assessment of the literature on cloud computing security: Risks and countermeasures,” IEEE Access, vol. 9, pp. 57792–57807, 2021.

V. Bandari, “Enterprise data security measures: A comparative analysis of risks and efficacy across various industries and types of organizations,” International Journal of Business Intelligence and Big Data Analytics, vol. 6, no. 1, pp. 1–11, 2023.

S. Padmavathi, P. Chinnasamy, S. Rakesh, and R. Swathy, “Effective cloud computing data security with hybrid cryptography,” in Proc. ICICCT 2020, Singapore: Springer, 2021.

M. Lane, A. Shrestha, and O. Ali, “Managing the risks of data security and privacy in the cloud: A shared responsibility between the cloud service provider and the client organisation,” in Proc. Bright Internet Worldwide Summit, Queensland, Australia: Univ. Southern Queensland, 2017.

Y. Shcherbinina, A. Filonenko, and B. Martseniuk, “Database security and research on cloud storage data encryption techniques,” Control, Navigation and Communication Systems, vol. 3, no. 61, pp. 104–106, 2020.

F. Maqsood, M. Ahmed, M. M. Ali, and M. A. Shah, “A comparison of contemporary methods in cryptography,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 442–448, 2017.

A. Rafique, W. Joosen, B. Lagaisse, E. H. Beni, and D. Van Landuyt, “CryptDICE: A distributed data security solution for safe cloud computing and data storage,” Information Systems, vol. 96, p. 101671, 2021.

F. T. Hocanın and J. M. Lukusa, “An evaluation of a hybrid security algorithm's performance in a safe cloud environment,” in Proc. IEEE, United States, 2023, pp. 1–5.

K. Rajalakshmi, M. Sambath, and L. Joseph, “Research challenges and future directions for data storage in cloud computing environment,” Romanian Journal of Applied Sciences and Technology, vol. 11, pp. 72–86, 2023.

V. S. D. Subramanian, S. Sathyalakshmi, and P. Devi, “An analysis of homomorphic encryption algorithms for cloud data security,” Rochester, NY, USA: Social Science Research Network (SSRN), 2020

B. N. Mithuna and F. G. Hayat, “Utilizing encryption and decryption algorithms to protect cloud data,” International Journal of Engineering and Modern Technology, vol. 8, pp. 16–23, 2022.

J. Tan et al., “Architectures and tradeoffs in cloud DBMS selection,” Proc. VLDB Endowment, 2019.

D. Ravindran and A. R. Dar, “An analysis of cloud environment scalability,” International Journal of Advanced Research in Computer Engineering and Technology, vol. 5, no. 7, pp. 2124–2128.

R. Pontes et al., “Performance trade-offs in a secure multi-party relational database,” New York, NY, USA: Association for Computing Machinery (ACM), 2017.

K. Pavani et al., “Issues with data security and privacy in cloud environments,” in Proc. IEEE, 2023.

M. K. Rafsanjani and H. Tabrizchi, “An overview of the problems, dangers, and solutions related to cloud computing security,” Journal of Supercomputing, vol. 76, no. 12, pp. 9493–9532.

V. Vennila, M. Prakash, and V. Rajkumar, “Secure data exchange in a cloud environment with access control, secrecy, and integrity,” Computer Systems Science and Engineering, vol. 40, no. 2, pp. 779–793, 2022.

J. K. Dawson et al., “Utilizing a non-deterministic cryptographic technique to protect cloud data privacy and confidentiality,” PLoS One, vol. 18, e0274628, 2023.

K. K. Singamaneni et al., “An efficient hybrid QHCP-ABE model to improve cloud data integrity and confidentiality,” Electronics, vol. 11, p. 3510, 2022.

R. Sada and S. Dubey, “Verification of data integrity in cloud computing,” International Journal of Scientific Research in Computer Science, Engineering, and Information Technology, vol. 9, pp. 208–213, 2023.

I. S. Alshawi and L. A. Muhalhal, “A hybrid modified lightweight algorithm to ensure confidentiality and data integrity,” Power Electronics and Drive Systems International Journal, vol. 13, pp. 833–841, 2023.

M. Fatima et al., “AES and RSA algorithms comparison for cloud computing data security,” Engineering Proceedings, vol. 20, p. 14, 2022.

A. C. N. Jebaseeli and A. A. Fairosebanu, “Cryptographic techniques used to secure data in cloud environments,” Electrical Engineering and Informatics Bulletin, vol. 12, pp. 462–471, 2023.

S. Reddy et al., “Cloud-based cryptographic security algorithm performance assessment,” E3S Web of Conferences, vol. 391, p. 01015, 2023.

J. Lai and S. H. Heng, “Hybrid cryptography for safe cloud file storage,” Informatics and Web Engineering Journal, vol. 1, no. 2, pp. 1–18, 2022.

H. Wijanarko, G. Gunawan, H. Arif, and A. Haikal, “Database security: An analysis of how SSL implementation affects MySQL 8.0.33,” Jurnal Jaringan Telekomunikasi, vol. 13, pp. 135–141, 2023.

J. Sheetalani and D. Kumar, “Examining critical distribution and management strategies for data dynamics in cloud computing storage security,” IOSR Journal of Computer Engineering, vol. 19, pp. 38–49, 2017.

J. Ahmed et al., “Utilizing machine learning models to determine the security level of different cryptosystems,” IEEE Access, vol. 9, pp. 9383–9393, 2021.

B. Arora and S. Sambya, “Hybrid security model for securing healthcare data on cloud,” Research Square, 2023. [Online]. Available: https://www.researchsquare.com/article/rs-2908979/v1

D. Shatokhin, “An enhanced encryption algorithm,” Global Journal of Engineering Research, vol. 23, pp. 33–40, 2023.

S. V. Sathyanarayana and R. M. Naik, “An overview of key management infrastructure in cloud computing environments,” The Information Society, vol. 2, pp. 52–61, 2017.

K. F. Jasim et al., “Examination of symmetric cipher algorithms appropriate for IoT device security,” Cihan University-Erbil Scientific Journal, vol. 5, no. 2, pp. 13–19, 2021.

I. H. Abdulqadder and I. T. Aziz, “An overview of cloud network orchestration for SDN and NFV security,” Cihan University-Erbil Scientific Journal, vol. 5, no. 1, pp. 20–27, 2021.

Y. A. Salih, S. Rashidi, and A. H. Mohammed, “Utilizing ensemble learning and software-defined networking to identify denial of service attacks in the internet of things,” Erbil Scientific Journal, Cihan University, vol. 6, no. 2, pp. 49–56.

Downloads

Published

2026-02-28

How to Cite

Majeed, A. M. A. . (2026). Design for The Purpose of Protecting Encryption Systems and Cloud Database Files. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(2), 92–105. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/886

Issue

Section

Articles