Skip to main content

Analysis and Review of Cloud Based Encryption Methods

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 49))

Abstract

Data security plays a crucial role in cloud computing. Cloud storages are secured and managed centrally by cloud service providers. Data stored in cloud is secured by encrypting them with the help of various encryption techniques and models. Encryption is very important from a data confidentiality point of view and should match the system and security requirements. Complex encryption methods increase the computational time of the cloud system whenever any data query is being processed. The encryption method has to produce a cipher text which cannot be easily predicted or decrypted without the encryption key. This paper discusses various encryption methods being developed and provides an analysis and comparative study on them.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Feng, D., Zhang, M., Zhang, Y., et al.: Study on cloud computing security. Chin. J. Softw. 22(1), 71–83 (2011)

    Article  Google Scholar 

  2. Xu, X., Zhou, J., Wang, X., Zhang, Y.: Multi-authority proxy re-encryption based on CPABE for cloud storage systems. J. Syst. Eng. Electron. 27(1), 211–223 (2016)

    Google Scholar 

  3. Jiang, L., Guo, D.: Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage. IEEE Access 5, 13336–13345 (2017)

    Article  Google Scholar 

  4. Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Proceedings of the International Conference Topics in Cryptology (CT-RSA), vol. 5985, pp. 119–131 (2010)

    Chapter  Google Scholar 

  5. Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of the Australasian Conference on Information Security and Privacy, vol. 6812, pp. 389–406 (2011)

    Google Scholar 

  6. Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)

    Article  Google Scholar 

  7. Zhu, H., Wang, L., Ahmad, H., Niu, X.: Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5, 20428–20439 (2017)

    Article  Google Scholar 

  8. Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Proceedings of the Cryptographers’ Track at the RSA Conference, pp. 119–131 (2017)

    Chapter  Google Scholar 

  9. Wang, Q., Peng, L., Xiong, H., Sun, J., Qin, Z.: Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6, 760–771 (2018)

    Article  Google Scholar 

  10. Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2014)

    Article  Google Scholar 

  11. Delerablée, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Proceedings of the International Conference on Pairing-Based Cryptography, pp. 39–59 (2007)

    Google Scholar 

  12. Wang, B., Li, B., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2012)

    Article  MathSciNet  Google Scholar 

  13. Sridhar, S., Smys, S.: A survey on cloud security issues and challenges with possible measures. In: International Conference on Inventive Research in Engineering and Technology, vol. 4 (2016)

    Google Scholar 

  14. Karthiban, K., Smys, S.: Privacy preserving approaches in cloud computing. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 462–467. IEEE (2018)

    Google Scholar 

  15. Praveena, A., Smys, S.: Ensuring data security in cloud based social networks. In: 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 289–295. IEEE (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vicky Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yadav, V., Mathew, R. (2020). Analysis and Review of Cloud Based Encryption Methods. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-43192-1_19

Download citation

Publish with us

Policies and ethics