To develop cryptographic techniques to test and validate the structure of cloud topologies

Authors

  • Sonam Chikara , Dr.Nishant Kumar Pathak Author

Keywords:

Cryptographic Techniques, Cloud Computing, Cloud Security, Topology Validation, Data Integrity

Abstract

The rapid adoption of cloud computing has introduced new challenges in ensuring the security and integrity of data stored and processed in cloud environments. Cryptographic techniques play a crucial role in safeguarding sensitive information against unauthorized access and potential threats. This research focuses on the development of advanced cryptographic techniques specifically tailored for testing and validating the structure of cloud topologies. The objective is to enhance the overall security posture of cloud-based systems by addressing vulnerabilities and ensuring the robustness of cryptographic mechanisms employed in these environments. Through the integration of innovative cryptographic protocols and methodologies, this study aims to contribute to the establishment of a secure foundation for cloud computing architectures. The research methodology involves a comprehensive analysis of existing cloud security models, the identification of potential weaknesses, and the design and implementation of novel cryptographic solutions to fortify the integrity and confidentiality of data within cloud topologies.

 

Downloads

Published

2024-01-08

Issue

Section

Articles