Secure Cloud Communication – A Comparative Study of Cryptographic Protocols

Authors

  • P. Pranav Teja Student, Department of Computer Science and Engineering, KL University, Vijayawada, India
  • P. N. S. Praveen Student, Department of Computer Science and Engineering, KL University, Vijayawada, India
  • A. Bhavya Student, Department of Computer Science and Engineering, KL University, Vijayawada, India
  • J. Aishwarya Student, Department of Computer Science and Engineering, KL University, Vijayawada, India
  • Surya Kanth V. Gangashetty Professor, Department of Computer Science and Engineering, KL University, Vijayawada, India

Keywords:

Cryptography (ECC), Encryption process, Security

Abstract

The need for secure communication is more important nowadays in today's digital world, as many essential processes rely largely on services provided by the cloud. In securing clouds communication, this work explores a thorough comparative examination of cryptographic protocols, namely the Diffie-Hellman algorithm, RSA, and ECC. Using an experimental and observational approach, the investigation carefully investigates several performance indicators, including latency, throughput, resource utilization, and scalability. By means of meticulous examination of data, the study seeks to reveal subtleties regarding the effectiveness of every cryptography protocol, clarifying their unique advantages and disadvantages. The main objective is to provide knowledgeable viewpoints to practitioners and decision-makers so they may choose protocols for cryptography wisely that meet the various and changing needs of cloud settings. The study's findings and suggestions provide a useful manual for optimizing safe communication tactics while negotiating the complex choices among security and performance present in the ever-changing cloud computing environment. This paper is a useful resource for strengthening the security postures of cloud-based communication networks and makes a significant contribution to the current discussion on cryptographic protocols. The results reported here provide parties looking to strengthen the cybersecurity of their cloud-based services with useful information by crossing the divide among theory and real-world application.

Downloads

Download data is not yet available.

Downloads

Published

03-12-2023

Issue

Section

Articles

How to Cite

[1]
P. P. Teja, P. N. S. Praveen, A. Bhavya, J. Aishwarya, and S. K. V. Gangashetty, “Secure Cloud Communication – A Comparative Study of Cryptographic Protocols”, IJMDES, vol. 2, no. 9, pp. 14–19, Dec. 2023, Accessed: Nov. 21, 2024. [Online]. Available: https://journal.ijmdes.com/ijmdes/article/view/175