
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
2025
Indexing Partners



















Confidential Computing Architectures for Enhanced Data Security in Cloud Environments
Author(s) | Anila Gogineni |
---|---|
Country | United States |
Abstract | The security method of confidential computing safeguard data in use scenarios it resolves the fundamental weakness in traditional methods which emphasize at-rest and in-transit encrypting of data. Applications that combine Trusted Execution Environments (TEEs) with hardware-based encryption techniques through confidential computing protect data throughout processing and block potential attacks from both internal threats and system vulnerabilities as well as unauthorized access. The research examines fundamental architectures of confidential computing such as Intel SGX together with AMD SEV and Arm CCA and Google Cloud Confidential VMs which demonstrate their advantages and implementation hurdles and industrial applications covering finance and healthcare and government and enterprise cloud security needs. The implementation of confidential computing technologies encounters both performance reduction as well as side-channel attacks and complexities with key management practices. Research that will take place looks into developing post-quantum security and AI-assisted operations in combination with standardization procedures to promote increased scalability and interoperability. The rise of cloud computing implementation will make confidential computing an essential component for present-day cybersecurity infrastructure. |
Keywords | Confidential Computing, Trusted Execution Environments (TEEs), Cloud Security, Data Privacy, Encryption, Side-Channel Attacks, Secure AI Processing, Post-Quantum Cryptography |
Field | Computer > Network / Security |
Published In | Volume 16, Issue 2, April-June 2025 |
Published On | 2025-04-01 |
Cite This | Confidential Computing Architectures for Enhanced Data Security in Cloud Environments - Anila Gogineni - IJSAT Volume 16, Issue 2, April-June 2025. |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
