Review of Encryption Techniques to Enhance Data Protection in Cloud
Keywords:
Cloud Security, cryptography, data protection, confidentialityAbstract
Cloud computing has become an essential source of data storage for both companies and individuals, making the protection of sensitive information increasingly necessary. The paper explores ways to protect data in the cloud through encryption, including symmetric, asymmetric, and hybrid encryption. Large-sized datasets can be handled quickly and effectively using symmetric encryption, like AES, while asymmetric encryption, like RSA, provides higher security using key pairs. Hybrid encryption combines these two methods, balancing speed and security for better protection. Advanced techniques like Proxy Re-Encryption (PRE) and Attribute-Based Encryption (ABE) help manage access control and scalability in cloud environments. This study examines the mentioned encryption methods, identifying challenges and proposing advancements to improve encryption solutions for cloud storage.
Downloads
References
Mell P, Grance T (2018) SP 800-145, The NIST Definition of cloud computing | CSRC (online) Csrc.nist.gov. https://csrc.nist.gov/publications/detail/sp/800-145/final.
IBM. Block. Accessed: Feb. 2020. [Online]. Available: https://www. ibm.com/cloud/learn/block-storage
D. Zhe, W. Qinghong, S. Naizheng, and Z. Yuhan, "Study on Data Security Policy Based on Cloud Storage," 2017 IEEE 3rd international conference on big data security on Cloud (big data security) 2017, pp. 145-149, doi: 10.1109/BigDataSecurity.2017.12.
Hamed Tabrizchi and Marjan Kuchaki Rafsanjani. 2020. A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76, 12 (Dec 2020), 9493–9532.https://doi.org/10.1007/s11227-020-03213-1
K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," in IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, Jan.-Feb. 2012, doi: 10.1109/MIC.2012.14.
S. M. Nakashe and K. R. Kolhe, "Smart Approach to Crawl Web Interfaces Using a Two-Stage Framework of Crawler," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 2018, pp. 1-6, doi: 10.1109/ICCUBEA.2018.8697592.
G. Sudhakar, H. Azath, P. A. Priya M and P. B. Edwinprabhakar, "A Hybrid Cloud Security System using Cryptography," 2023 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India, 2023, pp. 12-16, doi: 10.1109/ICECAA58104.2023.10212352
S. Kumar, G. Karnani, M. S. Gaur and A. Mishra, "Cloud Security using Hybrid Cryptography Algorithms," 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, 2021, pp. 599-604, doi: 10.1109/ICIEM51511.2021.9445377.
A. Priya, S. Saradha, (2021). Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security, International Journal Of Nonlinear Analysis And Applications, 12(2), 1785-1800. magiran.com/p2330058
Bermani, Ali & Murshedi, Tariq & Abod, Zaid. (2021). A hybrid cryptography technique for data storage on cloud computing. Journal of Discrete Mathematical Sciences and Cryptography. 24. 1-12. 10.1080/09720529.2020.1859799.
Ponnusamy, Chinnasamy & Deepalakshmi, P. (2022). HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in the healthcare cloud. Journal of Ambient Intelligence and Humanized Computing. 13. 1-19. 10.1007/s12652-021-02942-
K. Negi, R. Shrestha, T. L. Borges, S. Sahana, and S. Das, "A Hybrid Cryptographic Approach for Secure Cloud-Based File Storage," 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET), London, United Kingdom, 2023, pp. 1-7, doi: 10.1109/GlobConET56651.2023.10150148.
Pooja, and R. K. Chauhan. 2020. “Triple Phase Hybrid Cryptography Technique in a Wireless Sensor Network.” International Journal of Computers and Applications 44 (2): 148–53. doi:10.1080/1206212X.2019.1710342
Chegeni, Vahid & Haj Seyyed Javadi, Hamid & Goudarzi, M. & Rezakhani, Afshin. (2021). Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage cases. 10.48550/arXiv.2104.07714.
Eldouh, Ahmed & Amein, Ahmed & Elkouny, A. & Lu, Songfeng. (2022). Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection. International Journal of Applied Mathematics and Computer Science. 10.34768/amcs-2022-0011
Ali, Sijjad & Wadho, Shuaib & Yc, Aun & Gan, Ming & Lee, Chen. (2024). Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing. Egyptian Informatics Journal. 27. 100519. 10.1016/j.eij.2024.100519
J. Adilakshmi, B. Rithika, C. Pushpalatha, T. Venkatesh and M. Lohitha, "Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique," in 2024 4th International Conference on Pervasive Computing and Social Networking (ICPCSN), Salem, India, 2024, pp. 700-705, doi: 10.1109/ICPCSN62568.2024.00117.
C. Ge, W. Susilo, Z. Liu, J. Baek, X. Luo and L. Fang, "Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds," in IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 949-960, March-April 2024, doi: 10.1109/TDSC.2023.3265979.
Seth, Bijeta & Dalal, Surjeet & Jaglan, Vivek & Le, Dac-Nhuong & Mohan, Senthilkumar & Srivastava, Gautam. (2022). Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies. 33. 10.1002/ett.4108