Next-Generation Encryption Protocols for Cloud Data Protection in Fintech Environments

Authors

  • Renz Dominguez Fintech Consultant, Philippines Author

Keywords:

Cloud Data Protection, Fintech, encryption protocols, data security, Cyber Threats, financial data

Abstract

Cloud data protection is a critical concern, particularly in fintech environments where sensitive financial information is at risk. Next-generation encryption protocols play a pivotal role in safeguarding data integrity and confidentiality in the cloud. This study explores the significance of implementing advanced encryption protocols for securing financial data in cloud environments within the fintech sector. By examining the latest encryption technologies, including homomorphic encryption, quantum-resistant cryptography, and secure multi-party computation, this research aims to provide insights into enhancing data security and privacy in fintech cloud applications. The analysis focuses on the benefits and challenges of adopting next-generation encryption protocols, offering recommendations for fintech organizations to strengthen their data protection strategies and mitigate cybersecurity risks effectively.

References

Naseemuddin Mohammad, Enhancing Security and Privacy in Multi-Cloud Environments: A Comprehensive Study on Encryption Techniques and Access Control Mechanisms, International Journal of Computer Engineering and Technology (IJCET) 12(2), 2021, pp. 51-63.

Li J, Qiao Z, Zhang K, Cui C. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing. Sensors (Basel). 2021 Jan 4;21(1):288. doi: 10.3390/s21010288. PMID: 33406662; PMCID: PMC7795343.

Ramachandran, K. (2022). From application to deactivation: A comprehensive guide to payment card lifecycle management. Journal of Artificial Intelligence, Machine Learning and Data Science, 1(1).

Amr M. Sauber, Passent M. El-Kafrawy, Amr F. Shawish, Mohamed A. Amin, Ismail M. Hagag, "A New Secure Model for Data Protection over Cloud Computing", Computational Intelligence and Neuroscience, vol. 2021, Article ID 8113253, 11 pages, 2021. https://doi.org/10.1155/2021/8113253

Rehman, S.; Talat Bajwa, N.; Shah, M.A.; Aseeri, A.O.; Anjum, A. Hybrid AES-ECC Model for the Security of Data over Cloud Storage. Electronics 2021, 10, 2673.

Ramachandran, K. (2022). Transaction autopilot: AI enhanced fault-resilient processing for zero-downtime in payment systems. Journal of Artificial Intelligence, Machine Learning and Data Science, 1(1).

Decrypting the Encryption Debate: A Framework for Decision Makers (2018). Chapter: 2 Encryption and Its Applications. National Academies of Sciences, Engineering, and Medicine. 2018. Washington, DC: The National Academies Press. https://doi.org/10.17226/25010.

Mai V., Khalil I. Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography. Future Gener. Comput. Syst. 2017; 72: 327–338. doi: 10.1016/j.future.2016.06.003.

Ramachandran, K. (2018). Securing PII data in payment transactions: Challenges and solutions. International Journal of Core Engineering & Management, 5(8), 48-55.

Manaa, M.E. Data encryption scheme for large data scale in cloud computing. J. Telecommun. Electron. Comput. Eng. 2017, 9, 1–5

Security challenges in the evolving fintech landscape. 2016. PwC-PricewaterhouseCoopers Private Limited. https://www.pwc.in/assets/pdfs/consulting/cyber-security/banking/security-challenges-in-the-evolving-fintech-landscape.pdf

Ramachandran, K. (2023). Decoding resilience: The fail-fast formula for payment processing precision. Journal of Scientific and Engineering Research, 10(1), 79-84.

Next Generation Protocols – Market Drivers and Key Scenarios.First edition – May 2016, ISBN No. 979-10-92620-11-5, Editors: Andy Sutton, Richard Li.ETSI (European Telecommunications Standards Institute).

Joao Marcos de Mattos Barguil. Efficient Methods for Lattice-Based Cryptography. August 2015. Dissertation presented to the Polytechnic School of the University of Sao Paulo to obtain the title of Master of Science. DOI: 10.13140/RG.2.2.14433.30567

Ramachandran, K. (2018). Unified Payments Interface (UPI) - Transformation of digital payment systems in India. International Journal of Core Engineering & Management, 5(4), 42-48.

Zhong H., Cui J., Shi R., Xia C. Many-to-one homomorphic encryption scheme. Secur. Commun. Netw. 2015; 9:1007–1015. doi: 10.1002/sec.1395.

Brakerski Z., Gentry C., Halevi S. Packed Ciphertexts in LWE-Based Homomorphic Encryption; Proceedings of the Public-Key Cryptography-PKC 2013, Lecture Notes in Computer Science; Nara, Japan. 26 February–1 March 2013; Berlin/Heidelberg, Germany: Springer; 2013. pp. 1–13.

Singla, S.; Singh, J. Cloud computing security using encryption technique. Int. J. Adv. Res. Comput. Eng. Technol. 2013, 2, 673.

Ramachandran, K. (2019). Shielding the digital vault: Harnessing tokenization to safeguard financial transactions. Journal of Scientific and Engineering Research, 6(8), 338-345.

Gentry C. Fully homomorphic encryption using ideal lattices; Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing; Bethesda, MD, USA. 31 May–2 June 2009; pp. 169–178

Gentry C. Ph.D. Thesis. Stanford University; Stanford, CA, USA: 2009. A Fully Homomorphic Encryption Scheme.

Downloads

Published

2024-08-03

How to Cite

Renz Dominguez. (2024). Next-Generation Encryption Protocols for Cloud Data Protection in Fintech Environments. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 7(2), 7-16. https://ijrcait.com/index.php/home/article/view/IJRCAIT_07_02_002