Review of Encryption Techniques to Enhance Data Protection in Cloud

Review of Encryption Techniques to Enhance Data Protection in Cloud

Authors

  • Aniket Pattanshetti

Keywords:

Cloud Security, cryptography, data protection, confidentiality

Abstract

Cloud computing has become an essential source of data storage for both companies and individuals, making the protection of sensitive information increasingly necessary. The paper explores ways to protect data in the cloud through encryption, including symmetric, asymmetric, and hybrid encryption. Large-sized datasets can be handled quickly and effectively using symmetric encryption, like AES, while asymmetric encryption, like RSA, provides higher security using key pairs. Hybrid encryption combines these two methods, balancing speed and security for better protection. Advanced techniques like Proxy Re-Encryption (PRE) and Attribute-Based Encryption (ABE) help manage access control and scalability in cloud environments. This study examines the mentioned encryption methods, identifying challenges and proposing advancements to improve encryption solutions for cloud storage.

Downloads

Download data is not yet available.

References

Mell P, Grance T (2018) SP 800-145, The NIST Definition of cloud computing | CSRC (online) Csrc.nist.gov. https://csrc.nist.gov/publications/detail/sp/800-145/final.

IBM. Block. Accessed: Feb. 2020. [Online]. Available: https://www. ibm.com/cloud/learn/block-storage

D. Zhe, W. Qinghong, S. Naizheng, and Z. Yuhan, "Study on Data Security Policy Based on Cloud Storage," 2017 IEEE 3rd international conference on big data security on Cloud (big data security) 2017, pp. 145-149, doi: 10.1109/BigDataSecurity.2017.12.

Hamed Tabrizchi and Marjan Kuchaki Rafsanjani. 2020. A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76, 12 (Dec 2020), 9493–9532.https://doi.org/10.1007/s11227-020-03213-1

K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," in IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, Jan.-Feb. 2012, doi: 10.1109/MIC.2012.14.

S. M. Nakashe and K. R. Kolhe, "Smart Approach to Crawl Web Interfaces Using a Two-Stage Framework of Crawler," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 2018, pp. 1-6, doi: 10.1109/ICCUBEA.2018.8697592.

G. Sudhakar, H. Azath, P. A. Priya M and P. B. Edwinprabhakar, "A Hybrid Cloud Security System using Cryptography," 2023 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India, 2023, pp. 12-16, doi: 10.1109/ICECAA58104.2023.10212352

S. Kumar, G. Karnani, M. S. Gaur and A. Mishra, "Cloud Security using Hybrid Cryptography Algorithms," 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, 2021, pp. 599-604, doi: 10.1109/ICIEM51511.2021.9445377.

A. Priya, S. Saradha, (2021). Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security, International Journal Of Nonlinear Analysis And Applications, 12(2), 1785-1800. magiran.com/p2330058

Bermani, Ali & Murshedi, Tariq & Abod, Zaid. (2021). A hybrid cryptography technique for data storage on cloud computing. Journal of Discrete Mathematical Sciences and Cryptography. 24. 1-12. 10.1080/09720529.2020.1859799.

Ponnusamy, Chinnasamy & Deepalakshmi, P. (2022). HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in the healthcare cloud. Journal of Ambient Intelligence and Humanized Computing. 13. 1-19. 10.1007/s12652-021-02942-

K. Negi, R. Shrestha, T. L. Borges, S. Sahana, and S. Das, "A Hybrid Cryptographic Approach for Secure Cloud-Based File Storage," 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET), London, United Kingdom, 2023, pp. 1-7, doi: 10.1109/GlobConET56651.2023.10150148.

Pooja, and R. K. Chauhan. 2020. “Triple Phase Hybrid Cryptography Technique in a Wireless Sensor Network.” International Journal of Computers and Applications 44 (2): 148–53. doi:10.1080/1206212X.2019.1710342

Chegeni, Vahid & Haj Seyyed Javadi, Hamid & Goudarzi, M. & Rezakhani, Afshin. (2021). Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage cases. 10.48550/arXiv.2104.07714.

Eldouh, Ahmed & Amein, Ahmed & Elkouny, A. & Lu, Songfeng. (2022). Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection. International Journal of Applied Mathematics and Computer Science. 10.34768/amcs-2022-0011

Ali, Sijjad & Wadho, Shuaib & Yc, Aun & Gan, Ming & Lee, Chen. (2024). Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing. Egyptian Informatics Journal. 27. 100519. 10.1016/j.eij.2024.100519

J. Adilakshmi, B. Rithika, C. Pushpalatha, T. Venkatesh and M. Lohitha, "Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique," in 2024 4th International Conference on Pervasive Computing and Social Networking (ICPCSN), Salem, India, 2024, pp. 700-705, doi: 10.1109/ICPCSN62568.2024.00117.

C. Ge, W. Susilo, Z. Liu, J. Baek, X. Luo and L. Fang, "Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds," in IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 949-960, March-April 2024, doi: 10.1109/TDSC.2023.3265979.

Seth, Bijeta & Dalal, Surjeet & Jaglan, Vivek & Le, Dac-Nhuong & Mohan, Senthilkumar & Srivastava, Gautam. (2022). Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies. 33. 10.1002/ett.4108

Additional Files

Published

31-03-2025

How to Cite

Aniket Pattanshetti. (2025). Review of Encryption Techniques to Enhance Data Protection in Cloud. Vidhyayana - An International Multidisciplinary Peer-Reviewed E-Journal - ISSN 2454-8596, 10(si4). Retrieved from http://www.j.vidhyayanaejournal.org/index.php/journal/article/view/2152
Loading...