Encryption Techniques to Ensure Data Confidentiality in Cloud
V. Reena Catherine1, A. Shajin Nargunam2

1V. Reena Catherine, 1Research Scholar in Computer Science, Noorul Islam Centre for Higher Education,Kumaracoil, India. 

2A. Shajin Nargunam, 2Director /Academic Affairs,Depatment of CSE, Noorul Islam Centre for Higher Education,Kumaracoil, India

Manuscript received on 15 September 2019 | Revised Manuscript received on 23 September 2019 | Manuscript Published on 11 October 2019 | PP: 1047-1049 | Volume-8 Issue-11S September 2019 | Retrieval Number: K121509811S19/2019©BEIESP | DOI: 10.35940/ijitee.K1215.09811S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is proving to be a beneficial model for all types of users as it enables anyone to share and make use of the available pool of resources and get the desired services online. It reduces the operational and maintenance costs since the user needs to pay for what he has used. Databases and applications are moved to the cloud and stored in large data stores of the cloud service provider which may be insecure or untrustworthy. End users want to know the location of data being stored and who have control over the information apart from the owners. They particularly want the data to be secured from unintentional or illegal access even by the service providers. As the data are stored in geographically dispersed area, the data is vulnerable. The most important concern is that data confidentiality is to be attained while data is stored or in transit. To provide confidentiality, initially cryptographic approaches were used that disclose the keys needed for decryption only to the authorized users. But in the cloud, the adopted encryption schemes should support fine-grained access control, high performance, scalability as well as full delegation. In order to share valuable data confidentially on the cloud in a secured way, various encryption techniques are available starting from Identity-Based Encryption, Attribute-Based Encryption, Hierarchical Attribute-Based Encryption, Identity-Based Broadcast Encryption, Searchable Encryption, Homomorphic Encryption, Fully Homomorphic Encryption and so on. This paper analyses some of the recent and popular encryption techniques and discusses the issues related to them.

Keywords: Cloud computing, confidentiality, encryption techniques.
Scope of the Article: Cloud Computing