ARCHIVES

Original Article

Privacy-Preserving Data Storage Techniques in Cloud Databases

Sarvesh Ollalwar1 Nishant Patre2 Bhagyashree Kumbhare3 Yamini B. Laxane4
12Students, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India. 3HOD, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India. 4Professor MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India.

Published Online: May-August 2025

Pages: 176-183

References

[1] Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation.
[2] Popa, R. A., Redfield, C., Zeldovich, N., & Balakrishnan, H. (2011). CryptDB: Protecting confidentiality with encrypted query processing.
ACM Symposium on Operating Systems Principles.
[3] IBM Cloud Documentation. https://cloud.ibm.com/docs
[4] Microsoft Azure SQL Database. https://azure.microsoft.com/en-us/products/azure-sql/database/
[5] Google Cloud Spanner Documentation. https://cloud.google.com/spanner
[6] MedRec: A blockchain-based medical records system. MIT Media Lab. https://medrec.media.mit.edu/
[7] Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and
Applications.
[8] Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of
Computing (STOC '09), 169–178. https://doi.org/10.1145/1536414.1536440
[9] Dinh, T. T. A., Liu, R., Zhang, M., Chen, G., Ooi, B. C., & Wang, J. (2017). Untangling blockchain: A data processing view of blockchain
systems. Proceedings of the VLDB Endowment, 12(2), 198–211.
[10] Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., & Inácio, P. R. M. (2014). Security issues in cloud environments: A
survey. International Journal of Information Security, 13(2), 113–170. https://doi.org/10.1007/s10207-013-0208-7

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250402021

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.