State-of-the-Art Cryptographic Protocols and Their Efficacy in Mitigating E-Commerce Data Breaches on Public Clouds

Authors

  • Heshan Maduranga Department of Computer Science, University of Moratuwa, Moratuwa, Sri Lanka Author

Abstract

State-of-the-art cryptographic protocols represent one of the central bulwarks against pervasive threats to data integrity and confidentiality in e-commerce platforms hosted on public clouds. Modern online marketplaces increasingly store sensitive customer information on remote infrastructures to leverage elastic computing resources and high availability. The resulting operational convenience and global accessibility come at a price, as attackers continue devising new methods to exploit vulnerabilities in unprotected data flows, multi-tenant architectures, and misconfigured interfaces. Cryptographic approaches that protect data in transit, at rest, and during processing are crucial in mitigating the risk of data breaches. Advanced encryption standards, novel key exchange mechanisms, and fully homomorphic encryption schemes aim to fortify e-commerce platforms by ensuring that sensitive information remains secure even under adversarial conditions. The objective extends beyond traditional encryption-at-rest techniques, since evolving threats frequently target ephemeral secrets, cryptographic keys, or unencrypted states within application workflows. Forward secrecy, quantum-resistance, and zero-knowledge proofs all contribute to robust defenses that minimize data leakage, sabotage attempts, and insider malfeasance. Modern protocols like TLS 1.3, ephemeral Diffie-Hellman key exchanges, and post-quantum cryptographic algorithms address a diverse threat landscape where conventional methods may prove insufficient.

Downloads

Published

2020-10-04

How to Cite

State-of-the-Art Cryptographic Protocols and Their Efficacy in Mitigating E-Commerce Data Breaches on Public Clouds. (2020). Journal of Computational Intelligence for Hybrid Cloud and Edge Computing Networks, 4(10), 1-11. https://hashsci.com/index.php/JCIHCEC/article/view/2020-10-04