Security of Information in Cloud Computing: A Systematic Review

Data storage in cloud have become a great concern today. Many encryption and decryption methods have already been proposed to secure cloud data but everything comes with its pros and cons, this paper provides a critical overview of these cryptography techniques, issues and solutions regarding its security and availability.

[1]  Marek R. Ogiela,et al.  Application of Personalized Cryptography in Cloud Environment , 2016, 3PGCIC.

[2]  Hyoung-Kee Choi,et al.  Efficient Protocol for Searchable encryption and secure deletion on cloud storages , 2017, 2017 IEEE International Conference on Consumer Electronics (ICCE).

[3]  Nihad A. Hassan,et al.  Cryptography and Secure Communication , 2017 .

[4]  Audun Jøsang,et al.  The Impact of Quantum Computing on Present Cryptography , 2018, ArXiv.

[5]  Hao Yan,et al.  A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[6]  Abdel-Badeeh M. Salem,et al.  Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service , 2016, New Approaches in Intelligent Control.

[7]  Xu An Wang,et al.  Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage , 2016, 3PGCIC.

[8]  Arun Pratap Singh,et al.  Secure File Storage On Cloud Using Cryptography , 2020 .

[9]  Stephan Krenn,et al.  Agile cryptographic solutions for the cloud , 2017, Elektrotech. Informationstechnik.

[10]  Samir Abou El-Seoud,et al.  Studying Security of Data in Cloud Computing Through Cryptographic Approach , 2016, ICL.

[11]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[12]  Marek R. Ogiela,et al.  Application of Cognitive Cryptography in Fog and Cloud Computing , 2017, BWCCA.

[13]  Berk Sunar,et al.  Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Sadok Ben Yahia,et al.  Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment , 2017, EMCIS.

[15]  Zhaoe Min,et al.  A privacy-preserving parallel and homomorphic encryption scheme , 2017 .

[16]  Andrei Tchernykh,et al.  Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[17]  Karan Singh,et al.  Applications of Attribute-Based Encryption in Cloud Computing Environment , 2018 .

[18]  V. Vasudevan,et al.  A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data , 2018, Cluster Computing.

[19]  Pin Zhang,et al.  Security Enhancement for Data Migration in the Cloud , 2017, Future Internet.

[20]  Manfred Morari,et al.  Cloud-Based MPC with Encrypted Data , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[21]  Kim-Kwang Raymond Choo,et al.  Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.

[22]  Jian Liu,et al.  Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments , 2018, World Wide Web.

[23]  Lirong Qiu,et al.  Categorical quantum cryptography for access control in cloud computing , 2018, Soft Comput..

[24]  Farhat Anwar,et al.  Cryptography as a Service (CaaS): Quantum Cryptography for Secure Cloud Computing , 2017 .