Security of Information in Cloud Computing: A Systematic Review

Mehreen Ansar, Ijaz Ali Shokat, Mubeen Fatima, Kashif Nazir

Abstract


Data storage in cloud have become a great concern today. Many encryption and decryption methods have already been proposed to secure cloud data but everything comes with its pros and cons, this paper provides a critical overview of these cryptography techniques, issues and solutions regarding its security and availability.


Keywords


Cloud Computing; Encryption; Decryption; Cryptography Protocols; Quantum Cryptography.

Full Text:

PDF

References


. Babenko, M., Chervyakov, N., Tchernykh, A., Kucherov, N., Deryabin, M., Radchenko, G., & Svyatkin, V. (2018, January). Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack. In Young Researchers in Electrical and Electronic Engineering (EIConRus), 2018 IEEE Conference of Russian (pp. 270-274). IEEE.

. Wu, W., Parampalli, U., Liu, J., & Xian, M. (2018). Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments. World Wide Web, 1-23.

. Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1-12.

. Selvanayagam, J., Singh, A., Michael, J., & Jeswani, J. (2018). Secure file storage on cloud using cryptography.

. Kanna, G. P., & Vasudevan, V. (2018). A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. Cluster Computing, 1-9.

. Yan, H., Li, J., Han, J., & Zhang, Y. (2017). A novel efficient remote data possession checking protocol in cloud storage. IEEE Transactions on Information Forensics and Security, 12(1), 78-88

. Chatterjee, R., Roy, S., & Scholar, U. G. (2017). Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud. International Journal of Engineering Science, 11818.

. Ngnie Sighom, J. R., Zhang, P., & You, L. (2017). Security Enhancement for Data Migration in the Cloud. Future Internet, 9(3), 23.

. Yu, J. W., & Choi, H. K. (2017, January). Efficient Protocol for Searchable encryption and secure deletion on cloud storages. In Consumer Electronics (ICCE), 2017 IEEE International Conference on (pp. 444-447). IEEE.

. Min, Z., Yang, G., & Shi, J. (2017). A privacy-preserving parallel and homomorphic encryption scheme. Open Physics, 15(1), 135-142.

. Mavroeidis, V., Vishi, K., Zych, M. D., & Jøsang, A. (2018). The Impact of Quantum Computing on Present Cryptography. arXiv preprint arXiv:1804.00200.

. Lorünser, T., Krenn, S., Striecks, C., & Länger, T. (2017). Agile cryptographic solutions for the cloudWirkungsvolle Kryptographie-Lösungen für Cloud Computing. e & i Elektrotechnik und Informationstechnik, 134(7), 364-369.

. Qiu, L., Sun, X., & Xu, J. (2017). Categorical quantum cryptography for access control in cloud computing. Soft Computing, 1-8.

. Shankar, V., & Singh, K. (2018). Applications of Attribute-Based Encryption in Cloud Computing Environment. In Big Data Analytics (pp. 687-692). Springer, Singapore.

. Hassan, N. A., & Hijazi, R. (2017). Cryptography and Secure Communication. In Digital Privacy and Security Using Windows (pp. 195-272). Apress, Berkeley, CA.

. Hammami, H., Brahmi, H., Brahmi, I., & Yahia, S. B. (2017, September). Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment. In European, Mediterranean, and Middle Eastern Conference on Information Systems (pp. 397-413). Springer, Cham.

. Alexandru, A. B., Morari, M., & Pappas, G. J. (2018). Cloud-based MPC with Encrypted Data. arXiv preprint arXiv:1803.09891.

. Olanrewaju, R. F., Islam, T., Khalifa, O. O., Anwar, F., & Pampori, B. R. (2017). Cryptography as a Service (CaaS): Quantum Cryptography for Secure Cloud Computing. Indian Journal of Science and Technology, 10(7).

. Ogiela, M. R., & Ogiela, L. (2017, November). Application of Cognitive Cryptography in Fog and Cloud Computing. In International Conference on Broadband and Wireless Computing, Communication and Applications (pp. 293-298). Springer, Cham.

. Wang, X. A., Xhafa, F., Wu, G., & Wang, W. (2016, November). Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (pp. 281-291). Springer, Cham.

. El-Sofany, H. F., & El-Seoud, S. A. (2016, September). Studying Security of Data in Cloud Computing Through Cryptographic Approach. In International Conference on Interactive Collaborative Learning (pp. 433-443). Springer, Cham.

. Mohammad, O. K. J., El-Horbaty, E. S. M., & Salem, A. B. M. (2016). Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service. In New Approaches in Intelligent Control (pp. 241-272). Springer, Cham.F

. Ogiela, M. R., & Ogiela, L. (2016, November). Application of Personalized Cryptography in Cloud Environment. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (pp. 253-257). Springer, Cham.

. Parit, S. C., & Rachh, R. (2017). Ciphertext Policy Attribute Based Encryption.

. Dai, W., Doröz, Y., Polyakov, Y., Rohloff, K., Sajjadpour, H., Savaş, E., & Sunar, B. (2018). Implementation and evaluation of a lattice-based key-policy ABE scheme. IEEE Transactions on Information Forensics and Security, 13(5), 1169-1184.

. Odelu, V., Das, A. K., Rao, Y. S., Kumari, S., Khan, M. K., & Choo, K. K. R. (2017). Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Computer Standards & Interfaces, 54, 3-9


Refbacks

  • There are currently no refbacks.


 
 
  
 

 

  


About ASRJETS | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

ASRJETS is published by (GSSRR).