Security of Information in Cloud Computing: A Systematic Review

  • Mehreen Ansar Department of Computing, Riphah International University, Faisalabad, Pakistan
  • Ijaz Ali Shokat Department of Computing, Riphah International University, Faisalabad, Pakistan
  • Mubeen Fatima Department of Computing, SEECS, National University of Science and Technology,Islamabad, Pakistan
  • Kashif Nazir Department of Computing, Riphah International University, Faisalabad, Pakistan
Keywords: Cloud Computing, Encryption, Decryption, Cryptography Protocols, Quantum Cryptography.


Data storage in cloud have become a great concern today. Many encryption and decryption methods have already been proposed to secure cloud data but everything comes with its pros and cons, this paper provides a critical overview of these cryptography techniques, issues and solutions regarding its security and availability.


[1]. Babenko, M., Chervyakov, N., Tchernykh, A., Kucherov, N., Deryabin, M., Radchenko, G., & Svyatkin, V. (2018, January). Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack. In Young Researchers in Electrical and Electronic Engineering (EIConRus), 2018 IEEE Conference of Russian (pp. 270-274). IEEE.
[2]. Wu, W., Parampalli, U., Liu, J., & Xian, M. (2018). Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments. World Wide Web, 1-23.
[3]. Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1-12.
[4]. Selvanayagam, J., Singh, A., Michael, J., & Jeswani, J. (2018). Secure file storage on cloud using cryptography.
[5]. Kanna, G. P., & Vasudevan, V. (2018). A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. Cluster Computing, 1-9.
[6]. Yan, H., Li, J., Han, J., & Zhang, Y. (2017). A novel efficient remote data possession checking protocol in cloud storage. IEEE Transactions on Information Forensics and Security, 12(1), 78-88
[7]. Chatterjee, R., Roy, S., & Scholar, U. G. (2017). Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud. International Journal of Engineering Science, 11818.
[8]. Ngnie Sighom, J. R., Zhang, P., & You, L. (2017). Security Enhancement for Data Migration in the Cloud. Future Internet, 9(3), 23.
[9]. Yu, J. W., & Choi, H. K. (2017, January). Efficient Protocol for Searchable encryption and secure deletion on cloud storages. In Consumer Electronics (ICCE), 2017 IEEE International Conference on (pp. 444-447). IEEE.
[10]. Min, Z., Yang, G., & Shi, J. (2017). A privacy-preserving parallel and homomorphic encryption scheme. Open Physics, 15(1), 135-142.
[11]. Mavroeidis, V., Vishi, K., Zych, M. D., & Jøsang, A. (2018). The Impact of Quantum Computing on Present Cryptography. arXiv preprint arXiv:1804.00200.
[12]. Lorünser, T., Krenn, S., Striecks, C., & Länger, T. (2017). Agile cryptographic solutions for the cloudWirkungsvolle Kryptographie-Lösungen für Cloud Computing. e & i Elektrotechnik und Informationstechnik, 134(7), 364-369.
[13]. Qiu, L., Sun, X., & Xu, J. (2017). Categorical quantum cryptography for access control in cloud computing. Soft Computing, 1-8.
[14]. Shankar, V., & Singh, K. (2018). Applications of Attribute-Based Encryption in Cloud Computing Environment. In Big Data Analytics (pp. 687-692). Springer, Singapore.
[15]. Hassan, N. A., & Hijazi, R. (2017). Cryptography and Secure Communication. In Digital Privacy and Security Using Windows (pp. 195-272). Apress, Berkeley, CA.
[16]. Hammami, H., Brahmi, H., Brahmi, I., & Yahia, S. B. (2017, September). Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment. In European, Mediterranean, and Middle Eastern Conference on Information Systems (pp. 397-413). Springer, Cham.
[17]. Alexandru, A. B., Morari, M., & Pappas, G. J. (2018). Cloud-based MPC with Encrypted Data. arXiv preprint arXiv:1803.09891.
[18]. Olanrewaju, R. F., Islam, T., Khalifa, O. O., Anwar, F., & Pampori, B. R. (2017). Cryptography as a Service (CaaS): Quantum Cryptography for Secure Cloud Computing. Indian Journal of Science and Technology, 10(7).
[19]. Ogiela, M. R., & Ogiela, L. (2017, November). Application of Cognitive Cryptography in Fog and Cloud Computing. In International Conference on Broadband and Wireless Computing, Communication and Applications (pp. 293-298). Springer, Cham.
[20]. Wang, X. A., Xhafa, F., Wu, G., & Wang, W. (2016, November). Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (pp. 281-291). Springer, Cham.
[21]. El-Sofany, H. F., & El-Seoud, S. A. (2016, September). Studying Security of Data in Cloud Computing Through Cryptographic Approach. In International Conference on Interactive Collaborative Learning (pp. 433-443). Springer, Cham.
[22]. Mohammad, O. K. J., El-Horbaty, E. S. M., & Salem, A. B. M. (2016). Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service. In New Approaches in Intelligent Control (pp. 241-272). Springer, Cham.F
[23]. Ogiela, M. R., & Ogiela, L. (2016, November). Application of Personalized Cryptography in Cloud Environment. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (pp. 253-257). Springer, Cham.
[24]. Parit, S. C., & Rachh, R. (2017). Ciphertext Policy Attribute Based Encryption.
[25]. Dai, W., Doröz, Y., Polyakov, Y., Rohloff, K., Sajjadpour, H., Savaş, E., & Sunar, B. (2018). Implementation and evaluation of a lattice-based key-policy ABE scheme. IEEE Transactions on Information Forensics and Security, 13(5), 1169-1184.
[26]. Odelu, V., Das, A. K., Rao, Y. S., Kumari, S., Khan, M. K., & Choo, K. K. R. (2017). Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Computer Standards & Interfaces, 54, 3-9