Review Article

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

Table 10

The summary of the cryptographic techniques.

Cryptography techniquesReferencesSupported operationsUsabilityPrivacy

Identity-based encryption[145, 146]Use for data access controlRequired a valid password to access dataProvides a high level of privacy
Symmetric-key encryption[143]Encryption and Decryption of data using the same keyNo functionality can be performed on encrypted dataProvides a high level of privacy
Public-key encryption[144]Use for data access controlRequired a valid public key for encryption and private key for decryptionNo key exchange is required. Provides a very high level of privacy
Attribute-based encryption[147, 148]Data access control based on attributesLess secure than public-key encryptionProvides lesser privacy than public-key encryption
Functional encryption[149, 150]Used for selected plaintextRequired a valid functionPrivacy depends on the function
Fully HE[139]Allows all the arithmetic operationsPractically not useableProvides a very high level of privacy
Somewhat HE[137, 138]Allows more addition and one multiplicationUseable for limited arithmetic operationsProvides a medium level of privacy
Partially HE[134136]Allows only one arithmetic operationUseable for limited arithmetic operationsProvides a low level of privacy
Searchable encryption[140142]Allows query search on encrypted dataUseable on encrypted dataProvides a high level of privacy
Signcryption[151155]Used for user authenticationUseable when efficient authentication is requiredProvides a high level of privacy