IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

DATA PRIVACY PROTECTION IN CLOUD COMPUTING: A PRACTICAL REVIEW OF CHALLENGES AND SOLUTIONS

AUTHORS:
Kumar Aniket
Mentor
Abdul khalid
Affiliation
B.TECH(Information Technolog y) Department of Information Technology G. Noida - 201310, India
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Cloud computing has changed how we store and share data. It is convenient, cheap, and always available. But there is a problem — when your data is on someone else's computer, how do you know it is safe? Most cloud providers encrypt data, but they hold the keys. They can see your data whenever they want. This paper looks at real solutions for data privacy in the cloud. I explain traditional encryption, searchable encryption, homomorphic encryption, secure multi-party com-putation, differential privacy, and confidential computing Each method has strengths and weaknesses. No single solution works for everyone. The goal is to help you understand what is possible today and what is coming in the future.

Keywords
Article Metrics
Article Views
36
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Aniket, K. (2026). Data Privacy Protection in Cloud Computing: A Practical Review of Challenges and Solutions. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.251

Aniket, Kumar. "Data Privacy Protection in Cloud Computing: A Practical Review of Challenges and Solutions." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.251.

Aniket, Kumar. "Data Privacy Protection in Cloud Computing: A Practical Review of Challenges and Solutions." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.251.

References
1.Gentry, "Fully homomorphic encryption using ideal lattices ’ in Proc. 41st Annual ACM S ymfiosium on Theory of Computing, 2009, pp. 169-178.

2.X. Song, D. Wagner, and A. Perrig, ”Practical techniques for searches on encrypted data," in Proc. IEEE Symposium on Security and Privac y, 2000, pp. 44-55.

3.Dwork, "Differential privacy," in Proc. 33rd International Colloquium an Automata, Witguages and Pragramming, 2006, pp. 1-12.

4.Costan and S. Devadas, "Intel SGX explained," IACR Cryptalog y ePrint Archive, Report 2016/086, 2016.

5.Lindell, "Secure multi-pany computation," Communications of the ACM, vol. 64, no. 12, pp. 86-95, 2022.

6.Chase, A. Lysyanskaya, and D. Pointcheval, "Practical homomorphic encryption for cloud computing," IEEE Security & Privac y, vol. 21, no. 4, pp. 45-53, 2023.

7.National Institute of Standards and Technology, "Cloud computing privacy guidelines," NIST Special Publication 800-123,

8.ACM, "Cloud computing statistics 2024," ACM Digi/o/ Library,

9.Brakerski and V. Vaikuntanathan, "Efficient fully homomorphic encryption from (standard) LWE," SIAM Journal on CamFuting, vol. 43, no. 2, pp. 831-871, 2014.

10.European Parliament and Council, "General Data Protection Regulation (GDPR) compliance report 2024," Official Journal of the European Union,
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Intelligent Credit Card Fraud Detection System using Machine Learning Techniques
string(18) "Lakshana Shree U.M" U.M, L. S.
(2026)
DOI: 10.55041/ijsmt.v2i3.216
A Study on Employee Training and Development at Mahatma Gandhi Sahakar Sakare Karkhane Bhalki
string(19) "BHADRAPPA HARALAYYA" HARALAYYA, B.
(2026)
DOI: 10.55041/ijsmt.v2i4.613
Experimental Study on Retrofitting of Reinforced Cement Concrete Members using Fiber Reinforced Polymer Wraps
string(14) "Piyush N. Raut" Raut, P. N.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.330
Scroll to Top