
Application of Data Encryption Technology in Cloud Computing
- 1 School of Cyberspace Security, Zhengzhou University, No. 97, Wenhua Road, Wenhua Road Sub-district, Jinshui District, Zhengzhou City, Henan Province, China
* Author to whom correspondence should be addressed.
Abstract
With the rapid development of computer technology, cloud computing has been widely used in all walks of life, but the consequent network security problems have become increasingly prominent. This paper introduces data encryption technology to study the security challenges in cloud computing. Firstly, the basic characteristics of cloud computing are analyzed, and the security vulnerabilities of cloud computing are discussed. This study examines the function of data encryption technology in cloud computing in light of these issues, and deeply analyzes the applications and solutions of technologies for symmetric and asymmetric encryption, technologies for link and end-to-end data encryption both and node data encryption technology, in order to provide a reference for improving data security in cloud computing environment. The proposed data encryption scheme not only ensures data security but also effectively reduces the impact of encryption on the performance of cloud computing, demonstrating high practicality and feasibility. The research in this paper offers fresh concepts and techniques for the field of cloud computing security and is of great significance for promoting the wide application of cloud computing technology.
Keywords
data encryption technology, cloud computing, information security
[1]. Chen, Y., et al. (2024). Security and Privacy Challenges in Cloud Computing: A Survey. IEEE Transactions on Cloud Computing, 12(3), 567-580.
[2]. Huang Lei, Zhang Yuan. Research on security risks and preventive measures of cloud computing[J]. Information Recording Materials,2022,23(02):53-55. DOI:10.16009/j.cnki.cn13-1295/tq.2022.02.020.
[3]. Zhang, Y., et al. (2023). Data Security and Privacy Protection in Cloud Computing: A Comprehensive Review. Journal of Network and Computer Applications, 120, 1-15.
[4]. Smith, J., & Brown, L. (2024). Comprehensive Guide to Data Encryption. New York: TechBooks.
[5]. Lee, H., & Kim, B. (2022). Classification of Data Encryption Techniques. Journal of Cryptology, 35(1), 78-90.
[6]. Garcia, P., & Martinez, J. (2023). Irreversible Encryption and Hash Functions. Cryptography Research Journal, 22(1), 23-34.
[7]. Li, M., & Zhang, H. (2023). Link-Level Data Encryption Techniques. Journal of Network Security, 17(2), 210-225.
[8]. Chen, X., & Wu, F. (2022). Node-Level Data Encryption in Distributed Networks. Journal of Distributed Systems, 25(4), 301-315.
[9]. Shao Wenkui. Application of data encryption technology in computer network security [J]. Network Security Technology and Application, 2022, (08): 13-14
[10]. Garcia, A., & Martinez, J. (2023). Ensuring Cloud Stability and Reliability through Data Encryption. Journal of Cloud Computing, 12(3), 45-56.
[11]. Zhang Jie. Application of Data Encryption Technology in Computer Network Security [J]. Journal of Information and Computer Science, 2024, 36 (10): 225-227+231
[12]. Li Rong, Xia Yong, Zhang Qi, et al. On the Application of Data Encryption Technology in Computer Network Security [J]. Network Security Technology and Application, 2024, (01): 24-25
[13]. Chen, Y., & Liu, X. (2024). File Encryption Techniques for Data Security. IEEE Transactions on Information Forensics and Security, 19(3), 456-470.
[14]. Sang Jiacun. Research on the Application of Data Encryption Technology in Computer Network Security [J]. Digital Communication World, 2024, (11): 150-152
[15]. Garcia, A., & Martinez, J. (2023). Attribute-Based Encryption for Secure Data Sharing in Cloud Environments. Journal of Cloud Computing, 12(3), 45-56.
[16]. Sun L, Ye T, Lü S, et al. Security Analysis and Improvement of Transport Layer Security Protocol [J]. Journal of Software, 2003, (03): 518-523
[17]. Chen, Y., & Liu, X. (2024). VPN and Tunnel Encryption for Secure Data Transmission. IEEE Transactions on Information Security, 20(3), 234-245.
[18]. Yang Hongchao, Yi Mengjun, Li Peijia, et al. Review of the Application of Homomorphic Encryption in Deep Learning [J]. Computer Science and Exploration, 2024, 18 (12): 3065-3079
[19]. ohnson, M., & White, R. (2023). Data Anonymization Techniques for Privacy Protection. Journal of Data Privacy, 15(3), 210-225.
Cite this article
Zhao,A. (2025). Application of Data Encryption Technology in Cloud Computing. Applied and Computational Engineering,139,16-23.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 7th International Conference on Computing and Data Science
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).