Data privacy in cloud computing: A comparative study of privacy preserving techniques
Downloads
Cloud computing has emerged as a key service delivery model for business data storage and processing during the digital evolution. Nevertheless, the growth in cloud adoption has also brought great concern in matters concerning data security. This work proposes an in-depth comparison of all privacy preservation techniques in cloud computing including Cryptography, Anonymization, Access Control, Secure Multiparty Computation, and Blockchain. These techniques are assessed on the grounds of performance, scalability, complexity of implementation and effectiveness in the protection of the sensitive data. The research not only can find out more about these techniques, but also can also realize practical difficulties and achievements when applying these techniques. Based on case study and applications, the technique is also evaluated with its more practical concerns. Moreover, the study discusses potential threats, which were discovered and contemplated during the course of conducting the research, and finds out voids in the current knowledge stream, and provides guidelines for future work. Through integrating theoretical knowledge with best practices, this work intends to present a solid foundation to mitigate data privacy in cloud computing with secure and dependable cloud environments.
Downloads
1. Joshi, B., Joshi, B., Mishra, A., Arya, V., Gupta, A. K., & Peraković, D. (2022). A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. International Journal of Cloud Applications and Computing (IJCAC), 12(1), 1-11.
2. Domingo-Ferrer, J., Farras, O., Ribes-González, J., & Sánchez, D. (2019). Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications, 140, 38-60.
3. Thangavel, M., Varalakshmi, P., & Sridhar, S. (2016, March). An analysis of privacy preservation schemes in cloud computing. In 2016 IEEE International Conference on Engineering and Technology (ICETECH) (pp. 146-151). IEEE.
4. Pawar, A. B., Ghumbre, S. U., & Jogdand, R. M. (2023). Privacy preserving model-based authentication and data security in cloud computing. International Journal of Pervasive Computing and Communications, 19(2), 173-190.
5. Jiang, L., Xia, Z., & Sun, X. (2021). Review on privacy-preserving data comparison protocols in cloud computing. In Advances in Computers (Vol. 120, pp. 81-119). Elsevier.
6. Arefin, S., & Simcox, M. (2024). AI-Driven Solutions for Safeguarding Healthcare Data: Innovations in Cybersecurity. International Business Research, 17(6), 1-74.
7. Nagar, G., & Manoharan, A. (2024). UNDERSTANDING THE THREAT LANDSCAPE: A COMPREHENSIVE ANALYSIS OF CYBER-SECURITY RISKS IN 2024. International Research Journal of Modernization in Engineering Technology and Science, 6, 5706-5713.
8. Manoharan, A., & Nagar, G. MAXIMIZING LEARNING TRAJECTORIES: AN INVESTIGATION INTO AI-DRIVEN NATURAL LANGUAGE PROCESSING INTEGRATION IN ONLINE EDUCATIONAL PLATFORMS.
9. Arefin, S. (2024). Strengthening Healthcare Data Security with Ai-Powered Threat Detection. International Journal of Scientific Research and Management (IJSRM), 12(10), 1477-1483.
10. Kumar, S., & Nagar, G. (2024, June). Threat Modeling for Cyber Warfare Against Less Cyber-Dependent Adversaries. In European Conference on Cyber Warfare and Security (Vol. 23, No. 1, pp. 257-264).
11. Alferova, A. (2024). The Social Responsibility of Sports Teams. Emerging Joint and Sports Sciences, 15-27
12. Nagar, G., & Manoharan, A. (2022). THE RISE OF QUANTUM CRYPTOGRAPHY: SECURING DATA BEYOND CLASSICAL MEANS. 04. 6329-6336. 10.56726. IRJMETS24238.
13. Arefin, S. Mental Strength and Inclusive Leadership: Strategies for Workplace Well-being.
14. Nagar, G., & Manoharan, A. (2022). Blockchain technology: reinventing trust and security in the digital world. International Research Journal of Modernization in Engineering Technology and Science, 4(5), 6337-6344.
15. Joshua Ferdinand. (2024). Marine Medical Response: Exploring the Training, Role and Scope of Paramedics and Paramedicine. Qeios. doi:10.32388/F7WKCL.3.
16. Arefin, S. (2024). IDMap: Leveraging AI and Data Technologies for Early Cancer Detection. Valley International Journal Digital Library, 1138-1145.
17. Nagar, G. (2024). The evolution of ransomware: tactics, techniques, and mitigation strategies. International Journal of Scientific Research and Management (IJSRM), 12(06), 1282-1298.
18. Nagar, G., & Manoharan, A. (2022). THE RISE OF QUANTUM CRYPTOGRAPHY: SECURING DATA BEYOND CLASSICAL MEANS. 04. 6329-6336. 10.56726. IRJMETS24238.
19. Tyagi, A. K. (Ed.). (2023). Privacy preservation and secured data storage in cloud computing. IGI Global.
20. Nagar, G., & Manoharan, A. (2022). ZERO TRUST ARCHITECTURE: REDEFINING SECURITY PARADIGMS IN THE DIGITAL AGE. International Research Journal of Modernization in Engineering Technology and Science, 4, 2686-2693.
21. Chatterjee, P. (2023). Optimizing Payment Gateways with AI: Reducing Latency and Enhancing Security. Baltic Journal of Engineering and Technology, 2(1), 1-10.
22. Mishra, M. (2022). Review of Experimental and FE Parametric Analysis of CFRP-Strengthened Steel-Concrete Composite Beams. Journal of Mechanical, Civil and Industrial Engineering, 3(3), 92-101.
23. Chatterjee, P. (2022). Machine Learning Algorithms in Fraud Detection and Prevention. Eastern-European Journal of Engineering and Technology, 1(1), 15-27.
24. Krishnan, S., Shah, K., Dhillon, G., & Presberg, K. (2016). 1995: FATAL PURPURA FULMINANS AND FULMINANT PSEUDOMONAL SEPSIS. Critical Care Medicine, 44(12), 574.
25. Chatterjee, P. (2022). AI-Powered Real-Time Analytics for Cross-Border Payment Systems. Eastern-European Journal of Engineering and Technology, 1(1), 1-14.
26. Krishnan, S. K., Khaira, H., & Ganipisetti, V. M. (2014, April). Cannabinoid hyperemesis syndrome-truly an oxymoron!. In JOURNAL OF GENERAL INTERNAL MEDICINE (Vol. 29, pp. S328-S328). 233 SPRING ST, NEW YORK, NY 10013 USA: SPRINGER.
27. Krishnan, S., & Selvarajan, D. (2014). D104 CASE REPORTS: INTERSTITIAL LUNG DISEASE AND PLEURAL DISEASE: Stones Everywhere!. American Journal of Respiratory and Critical Care Medicine, 189, 1.
Copyright (c) 2025 Gireesh Kambala
This work is licensed under a Creative Commons Attribution 4.0 International License.