Privacy-Preserving Mechanisms in Cloud Computing Environments Through Zero-Knowledge Proofs

Authors

  • Gangasani Srinivasa Rao Cloud Security Analyst Author
  • Venkataramana Poli Reddy Cloud Security Analyst Author

Keywords:

Zero-Knowledge Proofs, Cloud Computing, Privacy, Cryptography, Secure Data Sharing

Abstract

The increasing reliance on cloud computing raises significant concerns about data security and privacy. Zero-Knowledge Proofs (ZKPs), a cryptographic method that enables one party to prove the truth of a statement without revealing any additional information, offer a promising solution. This paper explores privacy-preserving mechanisms in cloud computing environments through ZKPs, examining their applications, benefits, and challenges. The study emphasizes the utility of ZKPs in securing sensitive data, ensuring compliance, and maintaining trust in multi-party cloud systems

References

Goldwasser, Shafi, Silvio Micali, and Charles Rackoff. "The Knowledge Complexity of Interactive Proof Systems." SIAM Journal on Computing, vol. 18, no. 1, 1985, pp. 186–208.

Omkar Reddy Polu, Quantum-Resilient AI For Federated Anomaly Detection in Multi-Cloud Security Intelligence, International Journal of Cyber Security (IJCS), 1(1), 2023, 37-48 doi: https://doi.org/10.34218/IJCS_01_01_005

Ben-Sasson, Eli, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza. "Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture." Cryptology ePrint Archive, 2014.

Omkar Reddy Polu, Quantum-Resilient and Blockchain-Enhanced Federated Learning in Cloud Ecosystems for Advanced Privacy-Preserving AI, International Journal of Information Technology and Management Information Systems (IJITMIS), 14(2), 2023, pp. 58-67 doi: https://doi.org/10.34218/IJITMIS_14_02_008

Parno, Bryan, Jon Howell, Craig Gentry, and Mariana Raykova. "Pinocchio: Nearly Practical Verifiable Computation." IEEE Symposium on Security and Privacy, 2016.

Bowe, Sean, Ariel Gabizon, and Ian Miers. "Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model." Cryptology ePrint Archive, 2016.

Backes, Michael, et al. "Zero-Knowledge Proofs of Identity and Credential Systems." ACM Transactions on Information and System Security, vol. 14, no. 1, 2011, pp. 1–28.

Chaum, David, and Torben P. Pedersen. "Wallet Databases with Observers." CRYPTO '92: Advances in Cryptology, 1993.

Omkar Reddy Polu. (2023). Cognitive AI-Driven Deduplication for Autonomous and Hyper-Efficient Cloud Storage Optimization. International Journal of Cloud Technology and Management (IJCTM), 2(2), 1-14. doi: https://doi.org/10.34218/IJCTM_02_02_001

Androulaki, Elli, et al. "Identity Mixer: A Lightweight Approach to Privacy-Preserving Authentication." IBM Journal of Research and Development, vol. 55, no. 6, 2013, pp. 5:1–5:11.

Choudhury, Omkant, et al. "Privacy Preserving Protocols for Deep Learning in Cloud Computing." Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019.

Shwetha S. (2024). The Integration of Blockchain and Artificial Intelligence in Securing Healthcare Insurance Data. International Journal of Computer Science and Information Technology Research , 4(1), 63-70.

Salumanda Christian K. (2023). Analyzing the Impact of Machine Learning on Systemic Risk Identification in Global Financial Markets. International Journal of Information Technology and Electrical Engineering (IJITEE), 12(5), 7-11.

F. Scott Hawthorne. (2023). THE APPLICATION OF EXPLAINABLE AI IN RISK TRANSPARENCY FOR THE INSURANCE INDUSTRY. International Journal of Information Technology Research and Development (IJITRD), 4(2), 6-10.

S. Krishnakumar. (2023). Scalability and Performance Optimization in Next-Generation Payment Gateways. International Journal of Computer Science and Engineering Research and Development (IJCSERD), 6(1), 9-16.

Akshayapatra Lakshmi Harshini. (2021). A Comparative Study of UPI and Traditional Payment Methods: Efficiency, Accessibility, and User Adoption. International Journal of Computer Science and Engineering Research and Development (IJCSERD), 1(1), 10-16.

Groth, Jens. "On the Size of Pairing-Based Non-Interactive Zero-Knowledge Arguments." EUROCRYPT 2016: Advances in Cryptology, 2016.

Sally Abba. (2022). AI in Fintech: Personalized Payment Recommendations for Enhanced User Engagement. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 5(1), 13-20.

Surendra Devaraj. (2023). AI-Driven Predictive Analytics for Digital Transformation in Financial Technology. International Journal of Computer Science and Engineering Research and Development (IJCSERD), 13(2), 69-76.

Rajadhanabala samy. (2023). Integrating Multidimensional Big Data Analytics with Dynamic Financial Risk Assessment to Strengthen Decision-Making Frameworks. International Journal of Finance (IJFIN) - ABDC Journal Quality List, 36(5), 6-10.

Rahmatullah Ahmed Aamir. (2023). Enhancing Security in Payment Processing through AI-Based Anomaly Detection. International Journal of Information Technology and Electrical Engineering (IJITEE), 12(6), 11-19.

Miers, Ian, Christina Garman, Matthew Green, and Aviel D. Rubin. "Zerocoin: Anonymous Distributed E-Cash from Bitcoin." 2013 IEEE Symposium on Security and Privacy, 2013.

Arano Prince. (2021). Developing Resilient Health Financing Models in Response to Emerging Global Health Threats. International Journal of Computer Science and Engineering Research and Development (IJCSERD), 11(1), 29-38.

Das, A.M. (2022). Using Genetic Algorithms to Optimize Cyber Security Protocols for Healthcare Data Management Systems. International Journal of Computer Science and Applications, 1(1), 1–5.

Vidal, Silvia, and Joaquín García-Alfaro. "Towards Privacy-Preserving Data Storage in Cloud Computing." Future Generation Computer Systems, vol. 68, 2017, pp. 226–236.

Mohammed Jassim, A Multi-Layered Approach to Addressing Security Vulnerabilities in Internet of Things Architectures, International Journal ofArtificial Intelligence and Applications (IJAIAP), 2020, 1(1), pp. 21-27.

Geoffrey Ellenberg. (2021). A Framework for Implementing Effective Security Controls in Cloud Computing Environments. International Journal of Computer Science and Information Technology Research , 2(1), 9-18.

Zhao, Xinyi, et al. "Efficient Privacy-Preserving Proofs of Concept in Cloud Data Sharing." Journal of Computer and System Sciences, vol. 81, no. 6, 2015, pp. 1069–1083.

Harry Johnson. (2023). Cloud-Based Scalable Models for Data Analytics and Financal Risk Assessment Using Machine Learning. International Journal of Finance (IJFIN) - ABDC Journal Quality List, 36(5), 1-5.

Hannah Jacob. (2023). Exploring Blockchain and Data Science for Next-Generation Data Security. International Journal of Computer Science and Information Technology Research , 4(2), 1-9.

Zhang, Jun, and Marina Blanton. "Efficient Dynamic Proofs of Retrievability for Cloud Storage." Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012.

Gupta, P.P. (2023). Applications of AI-driven data analytics for early diagnosis in complex medical conditions. International Journal of Engineering Applications of Artificial Intelligence, 1(2), 1–9.

Camenisch, Jan, and Anna Lysyanskaya. "Efficient Non-Transferable Anonymous Multi-Show Credential System with Optional Anonymity Revocation." EUROCRYPT 2001: Advances in Cryptology, 2001.

Jain, D.S. (2023). Computational Methods for Real-Time Epidemic Tracking and Public Health Management. International Journal of Computer Applications in Technology (IJCAT), 1(1), 1–6.

Boneh, Dan, and Matt Franklin. "Identity-Based Encryption from the Weil Pairing." CRYPTO 2001: Advances in Cryptology, 2001.

Downloads

Published

2024-01-28

How to Cite

Privacy-Preserving Mechanisms in Cloud Computing Environments Through Zero-Knowledge Proofs. (2024). ISCSITR-INTERNATIONAL JOURNAL OF CLOUD COMPUTING (ISCSITR-IJCC) - ISSN (Online): 3067-7378, 5(1), 7-14. https://iscsitr.in/index.php/ISCSITR-IJCC/article/view/ISCSITR-IJCC_2020_05_01_02