Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad, Chiniot-Faisalabad Campus, Chiniot 35400, Pakistan.
Department of Computer Science, Superior University, Lahore 54000, Pakistan.
Comput Intell Neurosci. 2022 Jun 7;2022:8303504. doi: 10.1155/2022/8303504. eCollection 2022.
Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable computing resources. Thus, the privacy and security of data are of utmost importance to all of its users regardless of the nature of the data being stored. In cloud computing environments, it is especially critical because data is stored in various locations, even around the world, and users do not have any physical access to their sensitive data. Therefore, we need certain data protection techniques to protect the sensitive data that is outsourced over the cloud. In this paper, we conduct a systematic literature review (SLR) to illustrate all the data protection techniques that protect sensitive data outsourced over cloud storage. Therefore, the main objective of this research is to synthesize, classify, and identify important studies in the field of study. Accordingly, an evidence-based approach is used in this study. Preliminary results are based on answers to four research questions. Out of 493 research articles, 52 studies were selected. 52 papers use different data protection techniques, which can be divided into two main categories, namely noncryptographic techniques and cryptographic techniques. Noncryptographic techniques consist of data splitting, data anonymization, and steganographic techniques, whereas cryptographic techniques consist of encryption, searchable encryption, homomorphic encryption, and signcryption. In this work, we compare all of these techniques in terms of data protection accuracy, overhead, and operations on masked data. Finally, we discuss the future research challenges facing the implementation of these techniques.
云计算是计算作为一种实用工具的长期梦想,用户可以将其数据远程存储在云中,从而从可配置计算资源的共享池中享受按需服务和高质量的应用程序。因此,数据的隐私和安全性对其所有用户都至关重要,无论存储的数据性质如何。在云计算环境中,这一点尤为重要,因为数据存储在各种位置,甚至在世界各地,用户无法对其敏感数据进行任何物理访问。因此,我们需要某些数据保护技术来保护通过云外包的敏感数据。在本文中,我们进行了系统文献综述 (SLR),以说明保护通过云存储外包的敏感数据的所有数据保护技术。因此,本研究的主要目标是综合、分类和确定该研究领域的重要研究。因此,本研究采用循证方法。初步结果基于对四个研究问题的回答。在 493 篇研究文章中,选择了 52 项研究。52 篇论文使用了不同的数据保护技术,可以分为两大类,即非加密技术和加密技术。非加密技术包括数据分割、数据匿名化和隐写技术,而加密技术包括加密、可搜索加密、同态加密和签名加密。在这项工作中,我们从数据保护准确性、开销和对掩蔽数据的操作方面对所有这些技术进行了比较。最后,我们讨论了这些技术实施所面临的未来研究挑战。