Secured Sharing of Data Using Multi-Layer Encryption in Cloud Computing

Main Article Content

Al Jeeva, V Palanisamy

Abstract

Cloud computing has become a popular paradigm for hosting applications and storing data due to its scalability, flexibility, and cost-effectiveness. However, as more and more data is being stored in the cloud, security and privacy have become major concerns. One of the main challenges in cloud security is protecting data from unauthorized access and ensuring its confidentiality, integrity, and availability. Multi-layer encryption is a promising technique for addressing these challenges by encrypting data at different levels using different encryption algorithms. This paper explores the concept of secure data sharing in cloud computing using multi-layer encryption. We begin by providing an overview of cloud computing and its security challenges. We then discuss the basic principles of multi-layer encryption and its advantages over single-layer encryption. Next, we present a comprehensive review of recent research on secure data sharing in cloud computing using multi-layer encryption. We analyze different approaches for implementing multi-layer encryption and their effectiveness in enhancing the security of data. We also discuss the challenges of key management and the trade-off between security and performance. Moreover, researchers investigate alternative access control strategies that may be used in tandem with multi-layer encryption to enable fine-grained access control and further improve data security. Our analysis shows that multi-layer encryption can significantly improve the security of data in cloud computing and is a promising approach for secure data sharing in cloud environments. However, it also highlights the need for careful consideration of key management and performance issues, as well as the importance of using access control mechanisms to complement multi-layer encryption. In conclusion, this paper provides a comprehensive overview of secured data sharing using multi-layer encryption in cloud computing. For academics, professionals, and decision-makers with an interest in cloud security, it is anticipated that this paper would be a useful resource.

Article Details

Section
Articles