Cloud Security and Privacy – A Cryptographic Approach



Recently, cloud computing emerged as the leading technology for delivering reliable, secure, fault-tolerant, sustainable, and scalable computational services, which are presented as Software, Infrastructure, or Platform as services (SaaS, IaaS, PaaS). Moreover, these services may be offered in private data centers (private clouds), may be commercially offered for clients (public clouds) or yet it is possible that both public and private clouds are combined in hybrid clouds. As the user data is stored in some undisclosed location upon which the user does not have any control, it creates the atmosphere of vulnerability of security and privacy of user data. In this paper we have highlighted some of the security and privacy issues in cloud and the role of cryptography in mitigating those issues.

How to cite this article:
Bal PK. Cloud Security and Privacy – A Cryptographic Approach. J Engr Desg Anal 2020; 3(2): 98-100.


Kantarcioglu M, Bensoussan A, Sing R. Impact of Security Risks on Cloud Computing Adoption. In proceeding of IEEE International Conference on Communication. Control and Computing 2011; 670-674.

Mohemed Almorsy, John Grundy and Amani S. Ibrahim. Collaboration-Based Cloud Computing Security Management Framework. In proceeding of IEEE International Conference on Cloud Computing. 2011; 364-371.

Shaikh FB, Haider S. Security Threats in Cloud Computing. In proceeding of IEEE International Conference on Internet Technology and Secured Transactions. 2011; 214-219.

Hay B, Nance K, Bishop M. Storm Clouds Rising: Security Challenges for laaS Cloud Computing. Proceedings of the 44th Hawaii International Conference on System ciences. 2011; 1-7.

Maha TEBAA, Satd EL HAJJI, Abdellatif EL GHAZI. Homomorphic Encryption Applied to the Cloud Computing Security. World Congress on Engineering 2012; 1.

Curran K, Carlin S, Adams M. Security issues in cloud computing. Elixir Network Engg 2011; 38: 4069-4072.

Kaur R, Kinger S. Analysis of Security Algorithms in Cloud Computing. International Journal of Application or Innovation in Engineering & Management 2014; 3: 171-117.

Nigoti R, Jhuria M, Singh S. A Survey of Cryptographic algorithms for Cloud Computing. International Journal of Emerging Technologies in Computational and Applied Sciences 2013; 4: 141-146.

Hayward R, Chiang CC. Parallelizing fully homomorphic encryption for a cloud environment. Journal of applied research and technology 2015; 13(2): 245-252.

Wang WJ, Ren L, Chen L et al. Intrusion Detection and Security Calculation in Industrial Cloud Storage based on an lmproved Dynamic Immune Algorithm. Information Sciences. 2018.