Review Article

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

Table 14

Comparison of data protection techniques.

TechniquesLocal proxy overheadData accuracy retainsLevel of data protectionTransparencyOperation supportedApplicable condition

EncryptionLarge overhead on proxy because of encryption and decryptionProvides a high level of data accuracyProvides a very high level of data protection using encryptionRequires management of keyOnly storageApplicable when user wants high-level security and low-level performance
AnonymizationQuasi-attribute splitting overheadLow-level data accuracy depends on masking methodsThe average level of data protection depends on the anonymization methodsFully transparent for CSP and local proxyStorage, search on nonmasked data, and computationApplicable when testing over the statistical original data is required
SplittingRemains the same in all operationsProvides a high level of accuracy for the user and CSPProvides no guarantee about the protection of data fragmentsNot transparent for local proxy, keeps record of the fragments’ locationAll the operation cloud be performedApplicable when user wants high-level computation performance and low-level data security
Homomorphic encryptionLarge overhead on proxy because of large numbers of arithmetic operationsProvides a high level of accuracyProvides a high level of data protectionRequires management of keyStorage and arithmetic operation computationApplicable when the user wants high-level computation performance and also high-level data security
SigncryptionLarge overhead on proxy because of signcryption and unsigncryptionProvides a high level of data accuracyProvides a very high level of data protection like confidentiality and authenticationRequires management of keyOnly storageApplicable when user wants data confidentiality and authentication with high protection
SteganographyNo overhead on the local proxyProvides very low accuracy as compared to the other cryptographic techniquesProvides a medium level of data protectionFully transparent for CSP and local proxyOnly storageApplicable when the user wants a medium level of data protection with low computation