Enhancing Cloud Security in Oracle Cloud Infrastructure: Mitigating Threats with Hybrid Encryption
Keywords:
Cloud Computing, Oracle Cloud Infrastructure, Security Challenges, Data Privacy, Access Control, Identity Management, RSA, Blowfish.Abstract
Cloud computing has become an essential part of modern IT infrastructure, providing scalable and flexible solutions for organizations. Security concerns remain a significant barrier to its widespread adoption. This study explores key security challenges in Oracle Cloud Infrastructure (OCI), including data breaches, unauthorized access, identity management, and network vulnerabilities. While Oracle’s security tools, such as Oracle Cloud Guard and Data Safe, help mitigate these risks, evolving cyber threats demand continuous adaptation. The shared responsibility model further necessitates proactive security measures and regulatory compliance. To enhance cloud security, this study investigates the performance of hybrid encryption techniques, comparing RSA, Blowfish, based key management in OCI. Results show that the RSA + Blowfish model significantly improves encryption speed, reduces decryption latency, and enhances security metrics. Performance evaluation metrics confirm its robustness, with accuracy (99.47%), precision (99.12%), recall (99.08%), and F1-score (99.10%). These findings establish hybrid encryption as a promising approach for securing cloud-based data.
Downloads
References
Parvez, Mohammad T., and Suliman A. Alsuhibany. "Challenges and opportunities for Arabic CAPTCHAs." Multimedia Tools and Applications 83, no. 5 (2024): 14047-14062.
Salama, Ramiz, Sinem Alturjman, Chadi Altrjman, and Fadi Al-Turjman. "Distributed Mobile Cloud Computing Services Using Blockchain Technology." NEU Journal for Artificial Intelligence and Internet of Things 3, no. 1 (2024).
Xu, Fang, Tri Nguyen, and Jing Du. "Augmented Reality for Maintenance Tasks with ChatGPT for Automated Text-to-Action." Journal of Construction Engineering and Management 150, no. 4 (2024): 04024015.
Ayinla, Benjamin Samson, Ndubuisi Leonard Ndubuisi, Akoh Atadoga, Onyeka Franca Asuzu, Chinedu Ugochukwu Ike, and Rhoda Adura Adeleye. "Enhancing accounting operations through cloud computing: A review and implementation guide." World Journal of Advanced Research and Reviews 21, no. 2 (2024): 1935-1949.
Movahedisefat, Mohammad Reza, Seyyed Mohammad Reza Farshchi, and Davud Mohammadpur. "Emerging Security Challenges in Cloud Computing, from Infrastructure-Based Security to Proposed Provisioned Cloud Infrastructure." In Emerging trends in ICT security, pp. 379-393. Morgan Kaufmann, 2014.
Conteh, Foday. "A holistic insight into the privacy & security of cloud-based computing approach on healthcare information management systems in the United States–a grounded theory approach." Available at SSRN 4702677 (2024).
Bitkowska, Agnieszka, Damian Dziembek, and Tomasz Gzik. "Enterprise Resource Planning based on Cloud Computing (Cloud ERP)." Journal of Software & Systems Development 2024 (2024).
Lebeda, Frank J., Jeffrey J. Zalatoris, and Julia B. Scheerer. "Government cloud computing policies: Potential opportunities for advancing military biomedical research." Military medicine 183, no. 11-12 (2018): e438-e447.
Krumm, Niklas. "Organizational and Technical Security Considerations for Laboratory Cloud Computing." The Journal of Applied Laboratory Medicine 8, no. 1 (2023): 180-193.
Singh, Abhilasha, and Shivani Agarwal. "Cloud-Based License Plate Recognition for Smart City Using Deep Learning." In Cloud-based Intelligent Informative Engineering for Society 5.0, pp. 141-156. Chapman and Hall/CRC, 2023.
Cinar, Burak. "The Role of Cloud Service Brokers: Enhancing Security and Compliance in Multi-cloud Environments." Journal of Engineering Research and Reports 25, no. 10 (2023): 1-11.
Nawrocki, Piotr, Bartlomiej Sniezynski, Joanna Kolodziej, and Pawel Szynkiewicz. "Adaptive context‐aware service optimization in mobile cloud computing accounting for security aspects." Concurrency and Computation: Practice and Experience 33, no. 18 (2021): e6070.
Dražkovcová, Michaela. "Analýza využití cloud computingu." PhD diss., Masarykova univerzita, Ekonomicko-správní fakulta, 2023.
Saeed, Saqib, Salha A. Altamimi, Norah A. Alkayyal, Ebtisam Alshehri, and Dina A. Alabbad. "Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations." Sensors 23, no. 15 (2023): 6666.
Gundu, Srinivasa Rao, Charanarur Panem, and J. Vijaylaxmi. "A Glance View on Cloud Infrastructures Security and Solutions." Conversational Artificial Intelligence (2024): 1-15.
Kahn, Michael G., Joyce Y. Mui, Michael J. Ames, Anoop K. Yamsani, Nikita Pozdeyev, Nicholas Rafaels, and Ian M. Brooks. "Migrating a research data warehouse to a public cloud: challenges and opportunities." Journal of the American Medical Informatics Association 29, no. 4 (2022): 592-600.
Faruqi, Ubaid Ali. "Cloud Computing and the GLAM sector: A case study of the new Digital Archive Project of Åland Maritime Museum." (2023).
Poorani, S., and R. Anitha. "Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management." KSII Transactions on Internet & Information Systems 17, no. 11 (2023).
Nawrocki, Piotr, Jakub Pajor, Bartlomiej Sniezynski, and Joanna Kolodziej. "Modeling adaptive security-aware task allocation in mobile cloud computing." Simulation Modelling Practice and Theory 116 (2022): 102491.
Lee, Byeongcheon, Jinyeong Oh, Woojin Shon, and Jihoon Moon. "A Literature Review on AWS-Based Cloud Computing: A Case in South Korea." In 2023 IEEE International Conference on Big Data and Smart Computing (BigComp), pp. 403-406. IEEE, 2023.
Rajasekaran, Suresh Babu. "AI and Cloud Computing-How the Cloud is accelerating AI." International Journal of Intelligent Systems and Applications in Engineering 11, no. 1 (2023): 324-329.
Selvaraj, D., S. M. Sankar, D. Dhinakaran, and T. P. Anish. "Outsourced analysis of encrypted graphs in the cloud with privacy protection." arXiv preprint arXiv:2304.10833 (2023).
Eswari, G., G. K. Monica, V. Deepak, K. M. Sunil, and B. Prem Kumar. "Enhancing Cloud Storage Security with Intrusion Detection System using CNN and Grey Wolf Optimization Algorithm." In 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), pp. 557-563. IEEE, 2023.
Alsaroah, Ali Hussein, and Fadi Al-Turjman. "Combining Cloud Computing with Artificial intelligence and Its Impact on Telecom Sector." NEU Journal for Artificial Intelligence and Internet of Things 2, no. 3 (2023).
Avinash, Dangwani, Jetawat Ashok Kumar, and Rawat Chandansingh. "Use of AI in Cloud-Based Certificate Authentication for Travel Concession." In Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2023, pp. 349-361. Singapore: Springer Nature Singapore, 2023.
Kumar, Abhishek, Swarn Avinash Kumar, Vishal Dutt, Ashutosh Kumar Dubey, and Sushil Narang. "A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies." IJIMAI 8, no. 2 (2023): 150-157.
Sankar, S. M., D. Selvaraj, G. K. Monica, and Jeevaa Katiravan. "A Secure Third-Party Auditing Scheme Based on Blockchain Technology in Cloud Storage." arXiv preprint arXiv:2304.11848 (2023).
S. Armoogum and P. Khonje, “Healthcare Data Storage Options Using Cloud,” in The Fusion of Internet of Things, Artificial Intelligence, and Cloud Computing in Health Care, P. Siarry, M. A. Jabbar, R. Aluvalu, A. Abraham, and A. Madureira, Eds., in Internet of Things. , Cham: Springer International Publishing, 2021, pp. 25–46. doi: 10.1007/978-3-030-75220-0_2
D. Shivaramakrishna and M. Nagaratna, "A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control," Alexandria Engineering Journal, vol. 84, pp. 275-284, 2023
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.