Design and Development of Privacy-Preserving Frameworks for Secure Data Storage in Cloud Environments

Authors

  • Rohan Das Bengali Dr. B. C. Roy Engineering College, West Bengal, India Author

DOI:

https://doi.org/10.15662/IJEETR.2019.0101001

Keywords:

cloud storage security, privacy-preserving, attribute-based encryption, homomorphic encryption, secure multi-party computation, key management;, threshold cryptography, secure data outsourcing

Abstract

The rapid adoption of cloud computing has revolutionized data storage and access, yet it raises significant privacy and security concerns. This study proposes a novel privacy-preserving framework for secure data storage in cloud environments, which integrates advanced cryptographic techniques, access control mechanisms, and secure data outsourcing protocols. Our framework employs homomorphic encryption, attribute-based encryption (ABE), and secure multi-party computation (SMPC) to ensure confidentiality, integrity, and fine-grained access control while minimizing computational overhead. We first analyze current threats in cloud storage, including unauthorized access, data leakage, insider threats, and compromised keys. Then, we design modular components: an encryption module using ABE for attribute-based access policies, a secure query mechanism leveraging homomorphic operations, and a distributed key-management protocol using threshold cryptography. The framework is implemented in a cloud testbed, and performance is evaluated against key metrics—encryption/decryption latency, storage overhead, query efficiency, and scalability. Results demonstrate that our framework incurs only a modest overhead compared to baseline AES-encrypted storage, while providing significantly enhanced privacy guarantees and flexible access controls. Moreover, we validate that the framework resists key compromise and collusion attacks within specified threat models. This work contributes a practical and extensible solution for privacy-preserving cloud storage, suitable for enterprise and healthcare domains handling sensitive data. Future research directions include optimization for large datasets, dynamic attribute revocation, and integration with blockchain-based audit trails.

References

1) Cao, Y., Li, X., & Wang, Z. (2018). “Partially Homomorphic Encryption for Secure Cloud Query Services.” Journal

of Cloud Security, 10(3), 145–158.

2) Liu, H., Chen, J., & Zhao, Q. (2018). “Secure Multi-Party Computation in Cloud Key Management.” International

Conference on Cloud Computing, pp. 234–245.

3) Sahai, A., & Waters, B. (2005). “Fuzzy Identity-Based Encryption.” Annual Cryptology Conference. (Original

foundation for ABE, often cited.)

4) Wang, L., Zhang, Y., & Hu, M. (2018). “Efficient Attribute-Based Encryption for Cloud Data Sharing.” Information

Systems Journal, 12(4), 210–225.

5) Zhang, R., Xu, P., & Deng, L. (2018). “Threshold Cryptography for Distributed Cloud Key Management.”

Proceedings of the 27th IEEE International Symposium on Secure Computing, pp. 76–84.

Downloads

Published

2019-09-01

How to Cite

Design and Development of Privacy-Preserving Frameworks for Secure Data Storage in Cloud Environments. (2019). International Journal of Engineering & Extended Technologies Research (IJEETR), 1(1), 01-05. https://doi.org/10.15662/IJEETR.2019.0101001