|
Techniques | Local proxy overhead | Data accuracy retains | Level of data protection | Transparency | Operation supported | Applicable condition |
|
Encryption | Large overhead on proxy because of encryption and decryption | Provides a high level of data accuracy | Provides a very high level of data protection using encryption | Requires management of key | Only storage | Applicable when user wants high-level security and low-level performance |
Anonymization | Quasi-attribute splitting overhead | Low-level data accuracy depends on masking methods | The average level of data protection depends on the anonymization methods | Fully transparent for CSP and local proxy | Storage, search on nonmasked data, and computation | Applicable when testing over the statistical original data is required |
Splitting | Remains the same in all operations | Provides a high level of accuracy for the user and CSP | Provides no guarantee about the protection of data fragments | Not transparent for local proxy, keeps record of the fragments’ location | All the operation cloud be performed | Applicable when user wants high-level computation performance and low-level data security |
Homomorphic encryption | Large overhead on proxy because of large numbers of arithmetic operations | Provides a high level of accuracy | Provides a high level of data protection | Requires management of key | Storage and arithmetic operation computation | Applicable when the user wants high-level computation performance and also high-level data security |
Signcryption | Large overhead on proxy because of signcryption and unsigncryption | Provides a high level of data accuracy | Provides a very high level of data protection like confidentiality and authentication | Requires management of key | Only storage | Applicable when user wants data confidentiality and authentication with high protection |
Steganography | No overhead on the local proxy | Provides very low accuracy as compared to the other cryptographic techniques | Provides a medium level of data protection | Fully transparent for CSP and local proxy | Only storage | Applicable when the user wants a medium level of data protection with low computation |
|