Download

Empowering Security in Cloud Environment Using Encryption Technique

In Saudi Vision 2030 policy, the Saudi government has placed a high value on technical advancement. Saudi Arabia’s Vision 2030 plan, which intends to diversify the economy and generate new employment, has necessitated an increased focus on the country’s national cy- bersecurity policy. As a result, there is always a risk of data security breaches. The effective examination of cloud environment vulnerabilities was presented in many phases. Security mea- sures for such files are lacking in both efficiency and ease of use. A hacker may readily take advantage of this. The most widely utilized technique for data protection is cryptography. Technology that is ”practically resilient and impossible to assault” becomes critical. With the use of cryptographic algorithms, this study shows how to improve the security of data stored and shared over the network. Additionally, the confidentiality, integrity, and availability (CIA) measures will be ensured in the cloud environment; the most challenging issue is how to safe- guard data given that this information might be kept anywhere in the cloud. So, this method explains the cryptography techniques used by Cloud Service Providers (CSP). The idea of this work to safeguard information using hybrid encryption while still being efficient using high level language. This project is supposed to aid governments, businesses, and programmers in keeping their data secure in order that it can be utilized in delicate situations.

Information

  • Students: Aishah Flah - Noura Alnassar - Wesam Alrajhi
  • Supervisor: Dr. Mohammad Ali A. Hammoudeh
  • Research Specialization: Cybersecurity
  • Upload Date: 24/11/2022