Independent Researcher
Received on 07 June 2023; revised on 16 August 2023; accepted on 20 August 2023
A successful strategy for comprehensive data processing and storage is cloud computing. Nevertheless, in cloud environments maintaining confidentiality for critical data remains one of the biggest concerns for end-users as well as service providers. Homomorphic encryption has been proved to be one of the efficient techniques to handle the data securely in cloud while keeping the data secret. The importance of privacy preserving encryption in cloud computing environments is discussed in this paper to justify the significance of these protocols within the IT Industry that has evolved through the availability of elastic, on-demand resources. This paper presents an overview of privacy-preserving encryption techniques that enhance data security in cloud computing. We explore various encryption methodologies, including Symmetric, Asymmetric, and homomorphic encryption, as well as Encryption Protocols like SMPC, ZKPs, PRE and Functional Encryption. These protocols ensure data confidentiality and regulatory compliance while addressing the challenges of maintaining data utility and minimising exposure risks. By proposing a comprehensive framework that integrates these techniques, we aim to provide a robust solution for safeguarding data privacy in cloud environments, ultimately fostering trust and confidence in cloud services. However, as cloud adoption continues to grow, optimising these encryption protocols for computational efficiency and adaptability remains essential to achieving seamless, secure cloud operations across industries.
Cloud computing; Data Security; Encryption techniques; Community cloud; Symmetric and Asymmetric Encryption
Preview Article PDF
Ramesh Bishukarma. Privacy-preserving based encryption techniques for securing data in cloud computing environments. International Journal of Science and Research Archive, 2023, 09(02), 1014–1025. Article DOI: https://doi.org/10.30574/ijsra.2023.9.2.0441
Copyright © 2023 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0