DATA PRIVACY PROTECTION IN CLOUD COMPUTING: A PRACTICAL REVIEW OF CHALLENGES AND SOLUTIONS
Cloud computing has changed how we store and share data. It is convenient, cheap, and always available. But there is a problem — when your data is on someone else's computer, how do you know it is safe? Most cloud providers encrypt data, but they hold the keys. They can see your data whenever they want. This paper looks at real solutions for data privacy in the cloud. I explain traditional encryption, searchable encryption, homomorphic encryption, secure multi-party com-putation, differential privacy, and confidential computing Each method has strengths and weaknesses. No single solution works for everyone. The goal is to help you understand what is possible today and what is coming in the future.
Aniket, K. (2026). Data Privacy Protection in Cloud Computing: A Practical Review of Challenges and Solutions. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.251
Aniket, Kumar. "Data Privacy Protection in Cloud Computing: A Practical Review of Challenges and Solutions." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.251.
Aniket, Kumar. "Data Privacy Protection in Cloud Computing: A Practical Review of Challenges and Solutions." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.251.
2.X. Song, D. Wagner, and A. Perrig, ”Practical techniques for searches on encrypted data," in Proc. IEEE Symposium on Security and Privac y, 2000, pp. 44-55.
3.Dwork, "Differential privacy," in Proc. 33rd International Colloquium an Automata, Witguages and Pragramming, 2006, pp. 1-12.
4.Costan and S. Devadas, "Intel SGX explained," IACR Cryptalog y ePrint Archive, Report 2016/086, 2016.
5.Lindell, "Secure multi-pany computation," Communications of the ACM, vol. 64, no. 12, pp. 86-95, 2022.
6.Chase, A. Lysyanskaya, and D. Pointcheval, "Practical homomorphic encryption for cloud computing," IEEE Security & Privac y, vol. 21, no. 4, pp. 45-53, 2023.
7.National Institute of Standards and Technology, "Cloud computing privacy guidelines," NIST Special Publication 800-123,
8.ACM, "Cloud computing statistics 2024," ACM Digi/o/ Library,
9.Brakerski and V. Vaikuntanathan, "Efficient fully homomorphic encryption from (standard) LWE," SIAM Journal on CamFuting, vol. 43, no. 2, pp. 831-871, 2014.
10.European Parliament and Council, "General Data Protection Regulation (GDPR) compliance report 2024," Official Journal of the European Union,