Enhancing Data Privacy in Cloud-Based Systems Using Basic Encryption Techniques

Authors

  • Roan Timkang Southern Leyte State University -Tomas Oppus , Southern Leyte, Philippines
  • Efren I. Balaba Southern Leyte State University -Tomas Oppus , Southern Leyte, Philippines

Keywords:

Data privacy, Basic Encryption, Symmetric-Key Encryption

Abstract

With the increasing reliance on cloud services by individuals, businesses, and government entities, the risk of unauthorized access to sensitive data has grown significantly. This study explores the effectiveness of basic encryption techniques—specifically seed and symmetric-key encryption—in improving data privacy in cloud environments. These methods are easy to implement and offer a viable learning foundation while balancing security and performance, especially for users with limited resources. The research presents a framework for applying lightweight encryption in cloud systems and evaluates their efficiency, integration ease, and security resilience.

References

Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.

Bose, R., & Choudhury, S. (2018). Encryption algorithms for secure cloud storage: A review. International Journal of Data Science and Technology, 4(2), 25–32.

Bouncy Castle. (2023). Cryptography APIs for Java and C#. Retrieved from https://www.bouncycastle.org/

Buyya, R., Broberg, J., & Goscinski, A. (2011). Cloud computing: Principles and paradigms. Wiley.

Chatterjee, S., & Mishra, S. (2022). Performance comparison of symmetric-key encryption in cloud computing. International Journal of Cybersecurity, 9(2), 61–68.

Das, S., & Paul, B. (2020). A lightweight symmetric encryption algorithm for secure cloud storage. Journal of Cloud Computing Research, 11(1), 15–24.

Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.

IBM Cloud Docs. (2022). Encryption and security in cloud computing. Retrieved from https://cloud.ibm.com/docs/

Jain, P., & Bedi, R. (2019). Security and privacy issues in cloud computing. International Journal of Advanced Computer Science and Applications, 10(5), 145–150.

Johnson, M., & Lee, H. (2021). The evolution of cloud encryption methods. International Journal of Cloud Applications, 18(2), 89–101.

Kaur, G., & Bansal, A. (2020). Enhancing cloud security through hybrid encryption techniques. International Journal of Computer Applications, 177(33), 23–27.

Kerckhoffs, A. (1883). La cryptographie militaire. Journal des sciences militaires, 9, 5–38.

Kshetri, N. (2017). Cloud computing in developing economies. IT Professional, 19(2), 64–68.

Li, X., & Ma, X. (2021). Optimizing encryption performance using AES-NI. IEEE Access, 9, 78234–78245.

Mathur, R., & Agarwal, P. (2017). Comparative performance of cryptographic algorithms in cloud computing. CloudTech, 3(2), 17–22.

National Institute of Standards and Technology. (2001). Specification for the Advanced Encryption Standard (AES). NIST.

OpenSSL Project. (2023). OpenSSL: Cryptography and SSL/TLS toolkit. Retrieved from https://www.openssl.org/

Patil, S., & Wagh, S. (2017). Security challenges in cloud computing: A survey. International Journal of Engineering Research & Technology, 6(3), 1–5.

PyCryptodome. (2023). Python cryptographic library. Retrieved from https://www.pycryptodome.org/

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: Implementation, management, and security. CRC Press.

Schneier, B. (2015). Applied cryptography: Protocols, algorithms, and source code in C (20th anniversary ed.). Wiley.

Sengupta, S., Kaulgud, V., & Sharma, V. (2018). Cloud security challenges: A survey. Procedia Computer Science, 132, 150–157.

Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 656–715.

Sharma, P., & Gupta, A. (2019). Comparative analysis of AES, DES, and Blowfish encryption algorithms. International Journal of Computer Applications, 975(8887), 1–4.

Singh, A., & Juneja, M. (2018). A review of cryptographic algorithms for cloud computing. International Journal of Computer Science and Engineering, 6(4), 53–60.

Smith, J., & Kumar, R. (2020). Evaluating cloud security: A comparative study of encryption techniques. Journal of Information Security Research, 12(3), 45–52.

Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.

Wang, X., & Zhou, Y. (2020). Survey on brute-force attack resistance of symmetric encryption algorithms. International Journal of Security & Networks, 15(4), 293–304.

Zhou, Z., & Huang, M. (2020). Energy-efficient cryptographic techniques in cloud environments. Green Computing Journal, 8(1), 101–110.

Downloads

Published

2025-06-30