Secure and Privacy Preserving Data Processing Frameworks for Large Scale Cloud Based Systems
Keywords:
Cloud Computing, Privacy Preservation, Secure Data Processing, Homomorphic Encryption, Differential Privacy, Data Confidentiality, Multi-Tenant Security, Cryptographic FrameworksSynopsis
As the volume of data generated and processed in cloud-based systems escalates, the need for secure and privacy-preserving data processing frameworks has become imperative. This paper explores modern cryptographic and architectural solutions that allow for confidentiality, integrity, and compliance in large-scale distributed environments. We present a comprehensive overview of state-of-the-art methodologies, assess current implementation models, and propose a framework for scalable, secure data computation. Through performance metrics and comparative analysis, this study contributes to the identification of promising frameworks suitable for industrial applications.
References
[1] Gentry, C. (2009). "A Fully Homomorphic Encryption Scheme", Communications of the ACM, Vol. 52, No. 4.
[2] Gundaboina A. Data Loss Prevention in Healthcare: Advanced Strategies for Protecting PHI in Cloud Environments. Journal of Artificial Intelligence, Machine Learning and Data Science 2023 1(2), 3045-3051. DOI: doi.org/10.51219/JAIMLD/anjan-gundaboina/628
[3] Zhou, J., et al. (2016). "Security and Privacy in Cloud Computing: A Survey", Future Generation Computer Systems, Vol. 62, Issue 1.
[4] Sharma, A., & Chen, H. (2018). "Performance Tradeoffs in Secure Big Data Processing", Journal of Cloud Computing, Vol. 7, No. 3.
[5] Gundaboina A. Data Loss Prevention in Healthcare: Advanced Strategies for Protecting PHI in Cloud Environments. Journal of Artificial Intelligence, Machine Learning and Data Science 2023 1(2), 3045-3051. DOI: doi.org/10.51219/JAIMLD/anjan-gundaboina/628
[6] Wang, Y., et al. (2020). "Hybrid Privacy-Preserving Analytics for Cloud Systems", IEEE Transactions on Cloud Computing, Vol. 8, No. 2.
[7] Li, T., et al. (2021). "Privacy-Preserving Federated Learning for Medical Imaging", Neurocomputing, Vol. 414, Issue 2.
[8] Uppuluri, V. (2023). Design and Deployment of Predictive Models for Influenza Breakthrough Infections Using Pharmacy Test Data. Journal of Artificial Intelligence, Machine Learning & Data Science, 1(2), 3031–3037. https://doi.org/10.51219/JAIMLD/vijitha-uppuluri/626
[9] Kumar, R., & Singh, M. (2022). "Evaluation of Trusted Execution Environments for Cloud Security", Computer Security Journal, Vol. 41, No. 1.
[10] Brakerski, Z., & Vaikuntanathan, V. (2014). "Efficient Fully Homomorphic Encryption", SIAM Journal on Computing, Vol. 43, No. 2.
[11] Potla, R.B. (2023). Supplier Collaboration Portals for Component Manufacturers: Procure-to-Pay Automation and Working-Capital Outcomes. International Journal of Artificial Intelligence (ISCSITR-IJAI), 4(1), 16–40. https://doi.org/10.63397/ISCSITR-IJAI_04_01_002
[12] Wu, X., et al. (2017). "Privacy Preserving Data Mining in Cloud Using SMPC", Information Sciences, Vol. 384, Issue 1.
[13] Zhang, Y., et al. (2015). "DP-Cloud: Differential Privacy Preserving Framework", Journal of Parallel and Distributed Computing, Vol. 95, No. 3.
[14] Potla, R.B. (2023). Supplier Collaboration Portals for Component Manufacturers: Procure-to-Pay Automation and Working-Capital Outcomes. International Journal of Artificial Intelligence (ISCSITR-IJAI), 4(1), 16–40. https://doi.org/10.63397/ISCSITR-IJAI_04_01_002
[15] Lin, H., et al. (2019). "Federated Learning with Secure Aggregation", IEEE Internet of Things Journal, Vol. 6, No. 3.
[16] Sun, W., et al. (2018). "Privacy-Preserving Smart Healthcare with Cloud Support", IEEE Access, Vol. 6, No. 1.
[17] Chang, E., & Lee, J. (2016). "Big Data Security and Privacy Challenges", Journal of Information Security, Vol. 7, No. 4.
[18] Vallemoni, R.K. (2023). Data Lineage and Metadata in Payment Ecosystems: Auditability and Regulatory Readiness across the Life Cycle. Frontiers in Computer Science and Artificial Intelligence, 2(1), 46–58. https://doi.org/10.32996/fcsai.2023.2.1.5
[19] Feng, X., et al. (2020). "Blockchain-based Secure Data Sharing", Computers & Security, Vol. 95, Issue 5.
[20] Liu, Q., et al. (2017). "Secure Multiparty Computation: A Survey", ACM Computing Surveys, Vol. 50, No. 6.
[21] Han, J., et al. (2023). "Privacy-Preserving Analytics for Cloud-based IoT Systems", Future Internet, Vol. 15, No. 1.
Published
Series
Categories
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.