##plugins.themes.bootstrap3.article.main##

Ananthakrishna V

Chandra Shekhar Yadav

Abstract

Security is of utmost importance in the dynamic field of cloud computing. This study offers a comprehensive analysis of the latest advancements in cloud security, focusing specifically on a developing paradigm. The suggested technique combines Enhanced AuthPrivacyChain with hybrid encryption to provide a distinctive encryption solution. The aim of this study is to conduct a thorough analysis and evaluation of the present state of secure cloud computing. It addresses the significant issue of scalability by doing an analysis of more than 50 pertinent research publications. The proposed method improves the AuthPrivacyChain framework, a blockchain-based access control system, by providing an innovative hybrid encryption architecture. This solution deliberately combines the attributes of symmetric and asymmetric encryption, using their unique qualities to enhance the security of cloud data. The primary objectives are to attain precise access control, deter unauthorized access, and enable effective administration of encrypted data in cloud environments. The assessment emphasizes the significance of attribute-based encryption, homomorphic encryption, and multi-party computing in bolstering the security of data stored in the cloud. This conclusion is derived from the assessment of the chosen references. The AuthPrivacyChain architecture enhances security by using blockchain technology, which guarantees strong privacy safeguards and accountability in cloud transactions. Furthermore, the hybrid encryption model adeptly overcomes the constraints linked to conventional encryption methods, providing a meticulous equilibrium between security and performance. The literature that has been consistently researched underscores the need of improving scalability. The proposed technique may successfully handle the increasing demands of cloud computing environments by efficiently handling the growing number and complexity of data while maintaining strict security regulations. This review article is an essential resource for academics, business workers, and policymakers who are deeply engaged in the field of cloud security. By integrating knowledge from various sources, our work not only adds to the current discussion on protecting cloud data, but also establishes a foundation for future progress in the field, promoting creativity and resilience in the face of changing cybersecurity threats. and resilience in the face of evolving cybersecurity challenges.

##plugins.themes.bootstrap3.article.details##