ARCHIVES
Original Article
Privacy-Preserving Data Storage Techniques in Cloud Databases
Sarvesh Ollalwar1
Nishant Patre2
Bhagyashree Kumbhare3
Yamini B. Laxane4
12Students, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India. 3HOD, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India. 4Professor MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India.
Published Online: May-August 2025
Pages: 176-183
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250402021References
[1] Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation.
[2] Popa, R. A., Redfield, C., Zeldovich, N., & Balakrishnan, H. (2011). CryptDB: Protecting confidentiality with encrypted query processing.
ACM Symposium on Operating Systems Principles.
[3] IBM Cloud Documentation. https://cloud.ibm.com/docs
[4] Microsoft Azure SQL Database. https://azure.microsoft.com/en-us/products/azure-sql/database/
[5] Google Cloud Spanner Documentation. https://cloud.google.com/spanner
[6] MedRec: A blockchain-based medical records system. MIT Media Lab. https://medrec.media.mit.edu/
[7] Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and
Applications.
[8] Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of
Computing (STOC '09), 169–178. https://doi.org/10.1145/1536414.1536440
[9] Dinh, T. T. A., Liu, R., Zhang, M., Chen, G., Ooi, B. C., & Wang, J. (2017). Untangling blockchain: A data processing view of blockchain
systems. Proceedings of the VLDB Endowment, 12(2), 198–211.
[10] Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., & Inácio, P. R. M. (2014). Security issues in cloud environments: A
survey. International Journal of Information Security, 13(2), 113–170. https://doi.org/10.1007/s10207-013-0208-7
[2] Popa, R. A., Redfield, C., Zeldovich, N., & Balakrishnan, H. (2011). CryptDB: Protecting confidentiality with encrypted query processing.
ACM Symposium on Operating Systems Principles.
[3] IBM Cloud Documentation. https://cloud.ibm.com/docs
[4] Microsoft Azure SQL Database. https://azure.microsoft.com/en-us/products/azure-sql/database/
[5] Google Cloud Spanner Documentation. https://cloud.google.com/spanner
[6] MedRec: A blockchain-based medical records system. MIT Media Lab. https://medrec.media.mit.edu/
[7] Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and
Applications.
[8] Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of
Computing (STOC '09), 169–178. https://doi.org/10.1145/1536414.1536440
[9] Dinh, T. T. A., Liu, R., Zhang, M., Chen, G., Ooi, B. C., & Wang, J. (2017). Untangling blockchain: A data processing view of blockchain
systems. Proceedings of the VLDB Endowment, 12(2), 198–211.
[10] Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., & Inácio, P. R. M. (2014). Security issues in cloud environments: A
survey. International Journal of Information Security, 13(2), 113–170. https://doi.org/10.1007/s10207-013-0208-7
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025