Encryption and Privacy in Cloud Computing: A Comprehensive Review

Authors

  • Sunita Kumari

Keywords:

Cloud Computing, Encryption, Privacy, Data Security

Abstract

Cloud computing has revolutionized data storage, processing, and service delivery by offering scalable, cost-effective, and on-demand access to computing resources. However, with this paradigm shift, issues surrounding encryption and privacy have become pressing concerns for enterprises, governments, and individuals. The outsourcing of sensitive data to third-party cloud providers introduces risks such as unauthorized access, data breaches, insider threats, and jurisdictional ambiguities. Encryption, as a fundamental technique, provides a primary line of defense against these risks, but challenges remain in terms of key management, performance overhead, and compatibility with emerging applications such as big data analytics and the Internet of Things (IoT). This paper presents a comprehensive review of encryption mechanisms and privacy-preserving approaches in cloud environments. It explores classical encryption techniques, homomorphic encryption, attribute-based encryption, and searchable encryption, while also discussing privacy models such as differential privacy and anonymization. The review emphasizes the balance between robust security and system efficiency, highlighting the trade-offs between usability, scalability, and confidentiality. Further, the study identifies open research challenges including quantum-resistant cryptography, decentralized privacy frameworks, and regulatory compliance in multi-cloud settings. By synthesizing current advancements and ongoing debates, this review contributes to understanding the evolving landscape of encryption and privacy in cloud computing.

References

P. Mell and T. Grance, “The nist definition of cloud computing, special publication 800-145,” US Department of Commerce, Gaithersburg, MD, 2011.

M. Van Dijk and A. Juels, “On the impossibility of cryptography alone for privacy-preserving cloud computing,” in Proceedings of the 5th USENIX conference on Hot topics in security. USENIX Association, 2010, pp. 1–8.

T. Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance. O’Reilly Media, Incorporated, 2009.

C. Gentry, “A fully homomorphic encryption scheme,” Ph.D. dissertation, Stanford University, 2009.

B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, “On the (im) possibility of obfuscating programs,” in Advances in CryptologyCRYPTO 2001. Springer, 2001, pp. 1 18.

V. Vaikuntanathan, “Computing blindfolded: New developments in fully homomorphic encryption,” in Foundations of Computer Science (FOCS), 2011 IEEE 52nd Annual Symposium on. IEEE, 2011, pp. 5–16.

R. Gennaro, C. Gentry, and B. Parno, “Noninteractive verifiable computing: Outsourcing computation to untrusted workers,” in Advances in Cryptology–CRYPTO 2010. Springer, 2010, pp. 465–482.

S. G. Choi, J. Katz, R. Kumaresan, and H. Shacham, “Multi-server interactive verifiable computation.”

M. Naehrig, K. Lauter, and V. Vaikuntanathan, “Can homomorphic encryption be practical?” in Proceedings of the 3rd ACM workshop on Cloud computing security workshop. ACM, 2011, pp. 113–124.

Downloads

How to Cite

Sunita Kumari. (2015). Encryption and Privacy in Cloud Computing: A Comprehensive Review. International Journal of Engineering, Science and Humanities, 5(1), 06–11. Retrieved from https://www.ijesh.com/index.php/j/article/view/187

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.