A Survey on Cloud Computing Security Issues and Cryptographic Techniques

  • Vidushi Agarwal
  • Ashish K. Kaushal
  • Lokesh ChouhanEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 100)


Cloud computing is an Internet-based computing model, having various resources used by distinct users in a concurrent manner. Apart from all of its advantages, it faces a major setback due to various data security issues. To overcome these issues, various security mechanisms have been proposed, such as cryptography and authentication. Cryptography can be used to provide data integrity, authorization for data manipulation, and also making the data unreadable to an interceptor through encryption. There are various classifications of models in cloud computing. The service models are classified as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). There are several deployment models mainly distinguished by ownership which consists of public cloud, private cloud, and hybrid cloud. This survey mainly focuses on security issues in cloud service models and cloud deployment models along with various cryptographic mechanisms of data protection, such as symmetric key cryptography, asymmetric key cryptography, and their encryption algorithms.


Asymmetric algorithms Cloud computing Cryptography Symmetric algorithms Quantum cryptography 


  1. 1.
    Vasiljeva T, Shaikhulina S, Kreslins K (2017) Cloud computing: business perspectives, benefits and challenges for small and medium enterprises (Case of Latvia). Procedia Eng 178:443–451CrossRefGoogle Scholar
  2. 2.
    Lee J (2013) A view of cloud computing. Int J Networked Distrib Comput 1(1):2CrossRefGoogle Scholar
  3. 3.
    Poniszewska-Maranda Aneta (2014) Selected aspects of security mechanisms for cloud computing—current solutions and development perspectives. J Theor Appl Comput Sci 8(1):35–49Google Scholar
  4. 4.
    Bhadauria R, Sanyal S (2012) Survey on security issues in cloud computing and associated mitigation techniques. Int J Comput Appl 47(18):0975–888CrossRefGoogle Scholar
  5. 5.
    Chouhan PK, Yao F, Sezer S (2015) Software as a service: understanding security issues. In: Science and information conference 2015, 28–30 July 2015, London, UKGoogle Scholar
  6. 6.
    Ochani A, Dongre N (2017) Security issues in cloud computing. In: International conference on I-SMAC, IoT in social, mobile, analytics and cloud (I-SMAC 2017)Google Scholar
  7. 7.
    Chowdhury RR (2014) Security in cloud computing. Int J Comput Appl 96(15):0975–8887Google Scholar
  8. 8.
    Devi T, Ganesan R (2015) Platform-as-a-Service (PaaS): model and security issues. TELKOMNIKA Indonesian J Electr Eng 15(1):151–161Google Scholar
  9. 9.
    Jaiswal PR, Rohankar AW (2014) Infrastructure as a service: security issues in cloud computing. Int J Comput Sci Mob Comput 3(3):707–711Google Scholar
  10. 10.
    Murray A, Begna G, Nwafor E, Blackstone J, Patterson W (2015) Cloud service security and application vulnerability. In: Proceedings of the IEEE Southeast Conference 2015, 9–12 Apr 2015, Fort Lauderdale, FloridaGoogle Scholar
  11. 11.
    Chatterjee R, Roy S (2017) Cryptography in cloud computing: a basic approach to ensure security in cloud. IJESC 7(5)Google Scholar
  12. 12.
    Zhou X, Tang X (2011) Research and implementation of RSA algorithm for encryption and decryption. In: Proceedings of 2011 6th international forum on strategic technology, 2011, pp 1118–1121Google Scholar
  13. 13.
    Zhang C, Zhang Y (2008) Authenticated Diffie-Hellman key agreement protocol with forward secrecy. Wuhan Univ J Nat Sci 13(6):641–644MathSciNetCrossRefGoogle Scholar
  14. 14.
    Geetha V, Laavanya N, Priyadharshiny S, Sofeiyakalaimathy C (2016) Survey on security mechanisms for public cloud data. In: 2016 international conference on emerging trends in engineering, Technology and Science (ICETETS)Google Scholar
  15. 15.
    Schneier B (1994) Description of a new variable-length key, 64-bit block cipher (Blowfish). Springer, Berlin, Heidelberg, pp 191–204zbMATHGoogle Scholar
  16. 16.
    Han S-J, Oh H-S, Park J (1996) The improved data encryption standard (DES) algorithm. In: Proceedings of ISSSTA’95 international symposium on spread spectrum techniques and applications, vol 3, pp 1310–1314Google Scholar
  17. 17.
    Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-DES encryption. IBM J Res Dev 40(2):253–262CrossRefGoogle Scholar
  18. 18.
    NIST, “FIPS PUB 197: specification for the advanced encryption standard (AES) (2001)Google Scholar
  19. 19.
    Rivest R (1992) The MD5 message-digest algorithm. RFC 1321, Apr 1992Google Scholar
  20. 20.
    “Secure Hash Standard”, United States of American, National Institute of Science and Technology, Federal Information Processing Standard (FIPS) 180-1, Apr 1993Google Scholar
  21. 21.
    Shen J-J, Lin C-W, Hwang M-S (2003) A modified remote user authentication scheme using smart cards. IEEE Trans Consum Electron 49(2):414–416CrossRefGoogle Scholar
  22. 22.
    Kim H-S, Lee S-W, Yoo K-Y (2003) ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 37(4):32–41CrossRefGoogle Scholar
  23. 23.
    Adleman L (1994) Molecular computation of solutions to combinatorial problems. Science 266:1021–1023CrossRefGoogle Scholar
  24. 24.
    Xiao G, Lu M, Qin L, Lai X (2006) New field of cryptography: DNA cryptography. Sci Bull 51(12):1413–1420MathSciNetCrossRefGoogle Scholar
  25. 25.
    Prajapati Ashishkumar B, Barkha P (2016) Implementation of DNA cryptography in cloud computing and using socket programming. In: 2016 international conference on computer communication and informatics (ICCCI), 2016, pp 1–6Google Scholar
  26. 26.
    Gugnani G, Ghrera SP, Gupta PK, Malekian R, Maharaj BTJ (2016) Implementing DNA encryption technique in web services to embed confidentiality in cloud. Springer, New Delhi, pp 407–415Google Scholar
  27. 27.
    Wiesner SJ (1983) Conjugate coding. SIGACT News 15(1):78–88CrossRefGoogle Scholar
  28. 28.
    Olanrewaju RF, Islam T, Khalifa OO, Anwar F, Pampori BR (2017) Cryptography as a service (CaaS): quantum cryptography for secure cloud computing. Indian J Sci Technol 10(7):1–6CrossRefGoogle Scholar
  29. 29.
    Abdelminaam DS (2018) Improving the security of cloud computing by building new hybrid cryptography algorithms. 8(1):40–48Google Scholar
  30. 30.
    Moghaddam FF, Alrashdan MT, Karimi O (2013) A hybrid encryption algorithm based on RSA Small-e and Efficient-RSA for cloud computing environments. J Adv Comput Netw 238–241Google Scholar
  31. 31.
    Arockiam L, Monikandan S (2013) Data security and privacy in cloud storage using hybrid symmetric encryption algorithm. Int J Adv Res Comput. Commun Eng 2(8):3064–3070Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Vidushi Agarwal
    • 1
  • Ashish K. Kaushal
    • 1
  • Lokesh Chouhan
    • 1
    Email author
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology HamirpurHamirpurIndia

Personalised recommendations