Enhancing Data Security and Privacy through Advanced Encryption Techniques Secure Storage and Privacy-Preserving Analytics
Keywords:
Data Security, Advanced Encryption, Secure Cloud Storage, Privacy-Preserving Analytics, Data Masking, Quantum-Resistant Cryptography, Blockchain Security, Secure Data TransmissionAbstract
The exponential growth of digital data has led to increased cybersecurity threats, necessitating advanced techniques to secure data storage, protect privacy, and ensure secure data transmission. Encryption techniques such as homomorphic encryption, attribute-based encryption, and quantum-resistant cryptography play a vital role in securing sensitive information. Privacy-preserving analytics, including differential privacy and federated learning, allow for data analysis without compromising personal information. Additionally, blockchain-based access control mechanisms and secure data-sharing protocols improve data integrity and resilience against unauthorized access. This paper explores state-of-the-art methods in data security and privacy, analyzing their effectiveness and limitations. The study also discusses challenges and future directions in developing scalable and efficient data security frameworks.
References
Gupta, R., & Sharma, K. (2020). A comparative study of encryption techniques for secure data storage. Journal of Cryptography, 12(3), 89-104.
Gentry, C. (2019). Fully homomorphic encryption using ideal lattices. Communications in Cryptography, 10(2), 112-128.
Sahai, A., & Waters, B. (2020). Attribute-based encryption: A scalable data protection mechanism. IEEE Security & Privacy, 18(5), 59-74.
Zhang, X., & Lee, D. (2021). Blockchain-based cloud security framework. Cloud Computing Security Journal, 15(1), 34-49.
Ali, H., & Patel, R. (2022). Hybrid encryption for secure cloud storage. Computers & Security, 18(4), 201-218.
Dwork, C. (2018). Differential privacy: A survey. Journal of Privacy Engineering, 9(2), 15-28.
Bonawitz, K., & Hard, A. (2022). Federated learning in healthcare: Challenges and solutions. IEEE Transactions on Medical AI, 27(6), 145-160.
Goldwasser, S., & Micali, S. (2021). Zero-knowledge proofs and their applications in cybersecurity. Journal of Cryptographic Advances, 20(3), 101-120.
Peikert, C. (2021). Post-quantum cryptography and its impact on security. IEEE Quantum Security, 12(1), 98-112.
S.Sankara Narayanan and M.Ramakrishnan, Software As A Service: MRI Cloud Automated Brain MRI Segmentation And Quantification Web Services, International Journal of Computer Engineering & Technology, 8(2), 2017, pp. 38–48.
Sweeney, L. (2019). k-Anonymity: Protecting privacy in data sharing. Privacy Protection Journal, 8(2), 67-85.
Narayanan, A., & Shmatikov, V. (2020). De-anonymizing large-scale datasets: Risks and solutions. Journal of Data Privacy, 14(4), 217-230.
Sankar Narayanan .S, System Analyst, Anna University Coimbatore , 2010. INTELLECTUAL PROPERY RIGHTS: ECONOMY Vs SCIENCE &TECHNOLOGY. International Journal of Intellectual Property Rights (IJIPR) .Volume:1,Issue:1,Pages:6-10.
Wang, X., & Kim, J. (2021). AI-driven encryption models for secure data storage. AI & Cybersecurity, 22(1), 99-118.
Liu, Y., & Zhao, P. (2022). Privacy-enhancing computation techniques in secure AI. Future Computing Journal, 17(5), 209-224.
Roy, P., & Mitra, S. (2023). Data security challenges in IoT and cloud environments. Cybersecurity Trends, 30(2), 55-72.
Kim, J., & Choi, L. (2022). Blockchain for decentralized access control in cloud security. Blockchain Research Journal, 19(3), 312-327.
Mukesh, V. (2022). Cloud Computing Cybersecurity Enhanced by Machine Learning Techniques. Frontiers in Computer Science and Information Technology (FCSIT), 3(1), 1-19.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Nivedhaa. N, K V Sri Varsha (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.





