International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 2 April-June 2025 Submit your research before last 3 days of June to publish your research paper in the issue of April-June.

Confidential Computing Architectures for Enhanced Data Security in Cloud Environments

Author(s) Anila Gogineni
Country United States
Abstract The security method of confidential computing safeguard data in use scenarios it resolves the fundamental weakness in traditional methods which emphasize at-rest and in-transit encrypting of data. Applications that combine Trusted Execution Environments (TEEs) with hardware-based encryption techniques through confidential computing protect data throughout processing and block potential attacks from both internal threats and system vulnerabilities as well as unauthorized access. The research examines fundamental architectures of confidential computing such as Intel SGX together with AMD SEV and Arm CCA and Google Cloud Confidential VMs which demonstrate their advantages and implementation hurdles and industrial applications covering finance and healthcare and government and enterprise cloud security needs. The implementation of confidential computing technologies encounters both performance reduction as well as side-channel attacks and complexities with key management practices. Research that will take place looks into developing post-quantum security and AI-assisted operations in combination with standardization procedures to promote increased scalability and interoperability. The rise of cloud computing implementation will make confidential computing an essential component for present-day cybersecurity infrastructure.
Keywords Confidential Computing, Trusted Execution Environments (TEEs), Cloud Security, Data Privacy, Encryption, Side-Channel Attacks, Secure AI Processing, Post-Quantum Cryptography
Field Computer > Network / Security
Published In Volume 16, Issue 2, April-June 2025
Published On 2025-04-01
Cite This Confidential Computing Architectures for Enhanced Data Security in Cloud Environments - Anila Gogineni - IJSAT Volume 16, Issue 2, April-June 2025.

Share this