Affiliation:
1. Department of Computer Science and Engineering, Chaintanya Deemed to be University, Warangal, Telangana, India
Abstract
Cloud computing has gained immense popularity in recent years due to its on-demand and scalable computing resources. However, with the growth of cloud computing, privacy and security concerns have also increased. The primary concern is how to ensure the confidentiality and integrity of data in the cloud, as the data is stored on third-party servers. To address these concerns, various privacy-preserving techniques have been proposed, which allow users to store and process their data in the cloud without compromising privacy and security. We provide a thorough overview of current developments in privacy-preserving methods for safe cloud computing in this study. We start by giving a general review of cloud computing and the security issues it presents. Then, we go over a variety of privacy-preserving methods, such as differential privacy, homomorphic encryption, secure outsourcing, and secure multi-party computation. We also highlight their advantages and limitations. Finally, we conclude with some future research directions in privacy-preserving cloud computing.
Reference38 articles.
1. A. Juels and R. L. Rivest, “Honey encryption: security beyond the brute-force bound,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp. 59–79, 2014.
2. A. Kamara and A. Lauter, "Cryptographic Cloud Storage," in Financial Cryptography and Data Security, 2010, pp. 136-149.
3. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial Intelligence and Statistics, pp. 1273–1282, 2017.
4. C. C. Aggarwal, “Data privacy in the information age,” Springer, 2015.
5. C. Dwork, “Differential privacy,” in Automata, Languages and Programming, Springer, pp. 1–12, 2006.