Securing the Next Generation Cloud: A Survey of Emerging Technologies and their Impact on Cloud Security

Authors

  • Dr. Ibrar University of Shangla, Alpurai, Shangla, KPK, Pakistan
  • Fazal Qudus University of Shangla, Alpurai, Shangla, KPK, Pakistan
  • Dr.Mansoor Qadir Department of Computer Science, CECOS University of IT and Emerging Sciences, Peshawar, Pakistan
  • Suleman Shah Sarhad University of Science & Information Technology, Peshawar, KPK, Pakistan
  • Muhammad Atif University of Shangla, Alpurai, Shangla, KPK, Pakistan
  • Muhammad Islam University of Shangla, Alpurai, Shangla, KPK, Pakistan
  • Sadeeq Jan University of Engineering & Technology, Peshawar, KPK, Pakistan

Keywords:

Cloud computing, Security, Cryptography, Steganalysis, Steganography, Data and information security techniques

Abstract

Cloud computing is considered as the current market leader and future trend in computing resources. However, security is one of the main issue due to a large number of data saved on the cloud. There exist many traditional security techniques for the protection of data. This research explores various tools and techniques used in traditional cloud security and discusses the future prospects of securing data in the context of cloud computing. Within this investigation, key domains of security are explored, i.e., cryptography, data security, cyber security, steganalysis, and steganography. A notable contribution of this paper is a comparative analysis of the most widely used security algorithms in cloud computing. These algorithms, comprising 90% of the study, are evaluated in conjunction with other techniques and models. Furthermore, this research examines into novel approaches like the 2D Baker's map, employing piecewise linear chaotic maps (PWLCM) to improve security and sensitivity. This paper noticed the precedence of the Advanced Encryption Standard (AES) as the most used algorithm for encryption and decryption in cloud security and proposes its enhancement by integrating Attribute-Based Encryption (ABE) and Role-Based Access Control (RABS), Embedded Least-Significant Bit (LSB) and SHA-256 for image security. It also discovers innovative security measures, and blockchain technology to ensure robust security and privacy for data exchange in a cloud computing and IoT environment. For data encryption, Elliptic Curve Cryptography (ECC) is recommended and further techniques are explored to fortify system security, with a focus on Optical Amplitude Modulation (OAM) for enhanced security during Orthogonal Frequency-Division Multiplexing (OFDM) transmission. This research paper offers a comprehensive overview of the ever-evolving landscape of cloud security, encircling a wide spectrum of algorithms, techniques, and models. It serves as an invaluable resource for practitioners, researchers, and policymakers seeking to navigate the complexities of cloud security and stay level of emerging trends and strategies for ensuring data protection in cloud computing environments. Frequent system updates and patches are vital for a secure cloud environment.

Downloads

Published

2024-01-25