Skip to main content

Advances, Systems and Applications

Table 2 Major contributions in field of cloud privacy in past decade

From: Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach

Author (year)/Criteria

Factors of Data Privacy

Methodology used

Advantages of the proposed model

J. Schiffman (2010) [24]

Authorization, Authentication, Trustworthiness, Confidentiality, Availability, Integrity

Verifying a Multi-layer System

Mulit layer system help to achive privacy in better way

Z. Mahmood (2011) [23]

Access Control, Authentication, Integrity

A hybrid technique is proposed for data confidentiality and integrity

Confidentiality and integrity are used efficiently

Sun, Y (2014) [25]

Access Control, Authentication, Trustworthiness, Confidentiality, Availability

Privacy-preserving multi keyword ranked search approach

Access Control, Authentication, are assured and ranking has been given

Jakimoski, K. (2016) [26]

Authorization, Authentication, Integrity

Proposed security technique for confidentiality in cloud computing

Confidentially, Access Control are highlighted

Ning, J. (2017) [27]

Access Control, Trustworthiness, Integrity

Proposed system is resistant to key leakage attacks

Trustworthiness, Integrity are important to assure data privacy and avoid attacks

Roy, S. (2018) [28]

Access Control, Authorization, Trustworthiness, Integrity

Proposed fine-grained access control over cloud-based multi-server data along with a provably

One of the major advantage is On-demand access control to the cloud services

Yang, C. (2020) [29]

Access Control, Authorization, Trustworthiness, Integrity Availability

Proposed a cloud data deletion protocol to solve the behavior of tampering users by tampering with data deletion results when cloud server is not trusted

Used to avoid tempering of data that assures Confidentiality, Integrity, Availability, Authenticity

Suresha, K. (2021) [30]

Access Control, Authentication, Confidentiality, Integrity Availability

Proposed a system that uses attribute based encryption technique, threshold secret sharing and multi-authority access control mechanism

Attributed based encryption technique has been used

Ahmadi, S (2022) [31]

Authorization, Authentication, Confidentiality, Integrity

Highlighted Privacy-Preserving Cloud Computing

Authorization, Authentication has been higileghted

Qiwen Li, (2023) [32]

Authorization, Authentication, Confidentiality, Integrity

Homomorphic encryption technique

Using Authentication, Confidentiality, Integrity addresses Homoporpic encryption