Abstract
Data security plays a crucial role in cloud computing. Cloud storages are secured and managed centrally by cloud service providers. Data stored in cloud is secured by encrypting them with the help of various encryption techniques and models. Encryption is very important from a data confidentiality point of view and should match the system and security requirements. Complex encryption methods increase the computational time of the cloud system whenever any data query is being processed. The encryption method has to produce a cipher text which cannot be easily predicted or decrypted without the encryption key. This paper discusses various encryption methods being developed and provides an analysis and comparative study on them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Feng, D., Zhang, M., Zhang, Y., et al.: Study on cloud computing security. Chin. J. Softw. 22(1), 71–83 (2011)
Xu, X., Zhou, J., Wang, X., Zhang, Y.: Multi-authority proxy re-encryption based on CPABE for cloud storage systems. J. Syst. Eng. Electron. 27(1), 211–223 (2016)
Jiang, L., Guo, D.: Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage. IEEE Access 5, 13336–13345 (2017)
Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Proceedings of the International Conference Topics in Cryptology (CT-RSA), vol. 5985, pp. 119–131 (2010)
Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of the Australasian Conference on Information Security and Privacy, vol. 6812, pp. 389–406 (2011)
Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)
Zhu, H., Wang, L., Ahmad, H., Niu, X.: Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5, 20428–20439 (2017)
Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Proceedings of the Cryptographers’ Track at the RSA Conference, pp. 119–131 (2017)
Wang, Q., Peng, L., Xiong, H., Sun, J., Qin, Z.: Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6, 760–771 (2018)
Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2014)
Delerablée, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Proceedings of the International Conference on Pairing-Based Cryptography, pp. 39–59 (2007)
Wang, B., Li, B., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2012)
Sridhar, S., Smys, S.: A survey on cloud security issues and challenges with possible measures. In: International Conference on Inventive Research in Engineering and Technology, vol. 4 (2016)
Karthiban, K., Smys, S.: Privacy preserving approaches in cloud computing. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 462–467. IEEE (2018)
Praveena, A., Smys, S.: Ensuring data security in cloud based social networks. In: 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 289–295. IEEE (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Yadav, V., Mathew, R. (2020). Analysis and Review of Cloud Based Encryption Methods. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-43192-1_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-43192-1_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43191-4
Online ISBN: 978-3-030-43192-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)