Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 2 (February 2026).... Submit articles

Assuring encryption and security in cloud infrastructure

Breadcrumb

  • Home
  • Assuring encryption and security in cloud infrastructure

Ram Chandra Sachan 1, *, Sanjay Poddar 1, Nandan Sharma 1, Anil Kumar Moka 1 and Sudheer Kumar Lagisetty 1

1 Independent Researcher, USA.

2 Independent Researcher, CANADA.

Research Article

World Journal of Advanced Engineering Technology and Sciences, 2025, 14(03), 067-076

Article DOI: 10.30574/wjaets.2025.14.3.0091

DOI url: https://doi.org/10.30574/wjaets.2025.14.3.0091

Received on 13 January 2025; revised on 24 February 2025; accepted on 27 February 2025

The way organizations work has been totally changed by cloud computing, which gives versatile and reasonable arrangements for designing, implementing and overseeing applications. Critical information movement to the cloud has raised genuine security issues, particularly with respect to information judgment, privacy, and administrative compliance. Encryption is one of the most utilized mechanisms to ensure information security in cloud infrastructure. By changing information into a schema that can be pursued by authorized parties with the correct decryption keys, encryption secures information both in transit and at rest. Regardless of its benefits, encryption in cloud computing presents critical challenges, especially with respect to key administration, administrative compliance, and execution. This unique looks at the complementary parts of compliance and encryption in cloud computing, counting a rundown of the foremost later encryption developments, legitimate necessities and noteworthy industry challenges. Strong encryption strategies are vital to anticipate unauthorized get to cloud-based administrations that store a combination of open and private information, as well as to comply with legitimate prerequisites set by controls such as the Common Information Security Control, Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard. Various enactment require encryption as a component of their information security commitments, which pushes cloud benefit suppliers to form ever-more-complex encryption arrangements. Key administration issues include to the complexity of utilizing encryption. Organizations utilizing cloud situations need to strike a compromise between giving CSPs duty over key management and keeping control over their encryption keys. Administrations are becoming increasingly prevalent as ways to decrease these threats.

Cloud Computing; Encryption; Compliance; Data Security; Key Management; Homomorphic Encryption; Attribute-Based Encryption; AES, Regulatory Requirements; Data Privacy

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2025-0091.pdf

Preview Article PDF

Ram Chandra Sachan, Sanjay Poddar, Nandan Sharma, Anil Kumar Moka and Sudheer Kumar Lagisetty. Assuring encryption and security in cloud infrastructur. World Journal of Advanced Engineering Technology and Sciences, 2025, 14(03), 067-076. Article DOI: https://doi.org/10.30574/wjaets.2025.14.3.0091.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution