Enhancing Cloud Security in Oracle Cloud Infrastructure: Mitigating Threats with Hybrid Encryption

Authors

  • Sourabh Jain, Rajesh K Shukla

Keywords:

Cloud Computing, Oracle Cloud Infrastructure, Security Challenges, Data Privacy, Access Control, Identity Management, RSA, Blowfish.

Abstract

Cloud computing has become an essential part of modern IT infrastructure, providing scalable and flexible solutions for organizations. Security concerns remain a significant barrier to its widespread adoption. This study explores key security challenges in Oracle Cloud Infrastructure (OCI), including data breaches, unauthorized access, identity management, and network vulnerabilities. While Oracle’s security tools, such as Oracle Cloud Guard and Data Safe, help mitigate these risks, evolving cyber threats demand continuous adaptation. The shared responsibility model further necessitates proactive security measures and regulatory compliance. To enhance cloud security, this study investigates the performance of hybrid encryption techniques, comparing RSA, Blowfish, based key management in OCI. Results show that the RSA + Blowfish model significantly improves encryption speed, reduces decryption latency, and enhances security metrics. Performance evaluation metrics confirm its robustness, with accuracy (99.47%), precision (99.12%), recall (99.08%), and F1-score (99.10%). These findings establish hybrid encryption as a promising approach for securing cloud-based data.

Downloads

Download data is not yet available.

References

Parvez, Mohammad T., and Suliman A. Alsuhibany. "Challenges and opportunities for Arabic CAPTCHAs." Multimedia Tools and Applications 83, no. 5 (2024): 14047-14062.

Salama, Ramiz, Sinem Alturjman, Chadi Altrjman, and Fadi Al-Turjman. "Distributed Mobile Cloud Computing Services Using Blockchain Technology." NEU Journal for Artificial Intelligence and Internet of Things 3, no. 1 (2024).

Xu, Fang, Tri Nguyen, and Jing Du. "Augmented Reality for Maintenance Tasks with ChatGPT for Automated Text-to-Action." Journal of Construction Engineering and Management 150, no. 4 (2024): 04024015.

Ayinla, Benjamin Samson, Ndubuisi Leonard Ndubuisi, Akoh Atadoga, Onyeka Franca Asuzu, Chinedu Ugochukwu Ike, and Rhoda Adura Adeleye. "Enhancing accounting operations through cloud computing: A review and implementation guide." World Journal of Advanced Research and Reviews 21, no. 2 (2024): 1935-1949.

Movahedisefat, Mohammad Reza, Seyyed Mohammad Reza Farshchi, and Davud Mohammadpur. "Emerging Security Challenges in Cloud Computing, from Infrastructure-Based Security to Proposed Provisioned Cloud Infrastructure." In Emerging trends in ICT security, pp. 379-393. Morgan Kaufmann, 2014.

Conteh, Foday. "A holistic insight into the privacy & security of cloud-based computing approach on healthcare information management systems in the United States–a grounded theory approach." Available at SSRN 4702677 (2024).

Bitkowska, Agnieszka, Damian Dziembek, and Tomasz Gzik. "Enterprise Resource Planning based on Cloud Computing (Cloud ERP)." Journal of Software & Systems Development 2024 (2024).

Lebeda, Frank J., Jeffrey J. Zalatoris, and Julia B. Scheerer. "Government cloud computing policies: Potential opportunities for advancing military biomedical research." Military medicine 183, no. 11-12 (2018): e438-e447.

Krumm, Niklas. "Organizational and Technical Security Considerations for Laboratory Cloud Computing." The Journal of Applied Laboratory Medicine 8, no. 1 (2023): 180-193.

Singh, Abhilasha, and Shivani Agarwal. "Cloud-Based License Plate Recognition for Smart City Using Deep Learning." In Cloud-based Intelligent Informative Engineering for Society 5.0, pp. 141-156. Chapman and Hall/CRC, 2023.

Cinar, Burak. "The Role of Cloud Service Brokers: Enhancing Security and Compliance in Multi-cloud Environments." Journal of Engineering Research and Reports 25, no. 10 (2023): 1-11.

Nawrocki, Piotr, Bartlomiej Sniezynski, Joanna Kolodziej, and Pawel Szynkiewicz. "Adaptive context‐aware service optimization in mobile cloud computing accounting for security aspects." Concurrency and Computation: Practice and Experience 33, no. 18 (2021): e6070.

Dražkovcová, Michaela. "Analýza využití cloud computingu." PhD diss., Masarykova univerzita, Ekonomicko-správní fakulta, 2023.

Saeed, Saqib, Salha A. Altamimi, Norah A. Alkayyal, Ebtisam Alshehri, and Dina A. Alabbad. "Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations." Sensors 23, no. 15 (2023): 6666.

Gundu, Srinivasa Rao, Charanarur Panem, and J. Vijaylaxmi. "A Glance View on Cloud Infrastructures Security and Solutions." Conversational Artificial Intelligence (2024): 1-15.

Kahn, Michael G., Joyce Y. Mui, Michael J. Ames, Anoop K. Yamsani, Nikita Pozdeyev, Nicholas Rafaels, and Ian M. Brooks. "Migrating a research data warehouse to a public cloud: challenges and opportunities." Journal of the American Medical Informatics Association 29, no. 4 (2022): 592-600.

Faruqi, Ubaid Ali. "Cloud Computing and the GLAM sector: A case study of the new Digital Archive Project of Åland Maritime Museum." (2023).

Poorani, S., and R. Anitha. "Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management." KSII Transactions on Internet & Information Systems 17, no. 11 (2023).

Nawrocki, Piotr, Jakub Pajor, Bartlomiej Sniezynski, and Joanna Kolodziej. "Modeling adaptive security-aware task allocation in mobile cloud computing." Simulation Modelling Practice and Theory 116 (2022): 102491.

Lee, Byeongcheon, Jinyeong Oh, Woojin Shon, and Jihoon Moon. "A Literature Review on AWS-Based Cloud Computing: A Case in South Korea." In 2023 IEEE International Conference on Big Data and Smart Computing (BigComp), pp. 403-406. IEEE, 2023.

Rajasekaran, Suresh Babu. "AI and Cloud Computing-How the Cloud is accelerating AI." International Journal of Intelligent Systems and Applications in Engineering 11, no. 1 (2023): 324-329.

Selvaraj, D., S. M. Sankar, D. Dhinakaran, and T. P. Anish. "Outsourced analysis of encrypted graphs in the cloud with privacy protection." arXiv preprint arXiv:2304.10833 (2023).

Eswari, G., G. K. Monica, V. Deepak, K. M. Sunil, and B. Prem Kumar. "Enhancing Cloud Storage Security with Intrusion Detection System using CNN and Grey Wolf Optimization Algorithm." In 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), pp. 557-563. IEEE, 2023.

Alsaroah, Ali Hussein, and Fadi Al-Turjman. "Combining Cloud Computing with Artificial intelligence and Its Impact on Telecom Sector." NEU Journal for Artificial Intelligence and Internet of Things 2, no. 3 (2023).

Avinash, Dangwani, Jetawat Ashok Kumar, and Rawat Chandansingh. "Use of AI in Cloud-Based Certificate Authentication for Travel Concession." In Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2023, pp. 349-361. Singapore: Springer Nature Singapore, 2023.

Kumar, Abhishek, Swarn Avinash Kumar, Vishal Dutt, Ashutosh Kumar Dubey, and Sushil Narang. "A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies." IJIMAI 8, no. 2 (2023): 150-157.

Sankar, S. M., D. Selvaraj, G. K. Monica, and Jeevaa Katiravan. "A Secure Third-Party Auditing Scheme Based on Blockchain Technology in Cloud Storage." arXiv preprint arXiv:2304.11848 (2023).

S. Armoogum and P. Khonje, “Healthcare Data Storage Options Using Cloud,” in The Fusion of Internet of Things, Artificial Intelligence, and Cloud Computing in Health Care, P. Siarry, M. A. Jabbar, R. Aluvalu, A. Abraham, and A. Madureira, Eds., in Internet of Things. , Cham: Springer International Publishing, 2021, pp. 25–46. doi: 10.1007/978-3-030-75220-0_2

D. Shivaramakrishna and M. Nagaratna, "A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control," Alexandria Engineering Journal, vol. 84, pp. 275-284, 2023

Downloads

Published

15.11.2024

How to Cite

Sourabh Jain. (2024). Enhancing Cloud Security in Oracle Cloud Infrastructure: Mitigating Threats with Hybrid Encryption. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 2349 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7341

Issue

Section

Research Article