{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:25:25Z","timestamp":1773858325935,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users on the pay-per-use policy. It allows small businesses to use top-notch infrastructure at low expense. However, due to the cloud resource sharing property, data privacy and security are significant concerns and barriers for smart systems to constantly transfer generated data to the cloud computing resources, which a third-party provider manages. Many encryption techniques have been proposed to cope with data security issues. In this paper, different existing data protection and encryption techniques based on common parameters have been critically analyzed and their workflows are graphically presented. This survey aims to collect existing data encryption techniques widely presented in the literature for smart system data security offloaded to the cloud computing systems under a single umbrella.<\/jats:p>","DOI":"10.3390\/sym14040695","type":"journal-article","created":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T21:45:51Z","timestamp":1648590351000},"page":"695","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2985-6120","authenticated-orcid":false,"given":"Muhammad Bilal","family":"Qureshi","sequence":"first","affiliation":[{"name":"Department of Computer Science and IT, University of Lakki Marwat, Lakki Marwat 28420, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3908-6302","authenticated-orcid":false,"given":"Muhammad Shuaib","family":"Qureshi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, School of Arts & Sciences, University of Central Asia, Naryn 722918, Kyrgyzstan"}]},{"given":"Saqib","family":"Tahir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Shaheed Zulfikar Ali Bhutto Institute of Science & Technology, Islamabad 44000, Pakistan"}]},{"given":"Aamir","family":"Anwar","sequence":"additional","affiliation":[{"name":"School of Computing & Engineering, University of West London, London W5 5RF, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1523-1330","authenticated-orcid":false,"given":"Saddam","family":"Hussain","sequence":"additional","affiliation":[{"name":"School of Digital Science, University Brunei Darussalam, Jalan Tungku Link, Gadong BE1410, Brunei"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1919-3407","authenticated-orcid":false,"given":"Mueen","family":"Uddin","sequence":"additional","affiliation":[{"name":"School of Digital Science, University Brunei Darussalam, Jalan Tungku Link, Gadong BE1410, Brunei"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4958-2043","authenticated-orcid":false,"given":"Chin-Ling","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Changchun Sci-Tech University, Changchun 130600, China"},{"name":"Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan"},{"name":"School of Computer and Information Engineering, Xiamen University of Technology, Xiamen 361024, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,3,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Mondal, A., Paul, S., Goswami, R.T., and Nath, S. (2020, January 22\u201324). Cloud computing security issues & challenges: A review. Proceedings of the 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India.","DOI":"10.1109\/ICCCI48352.2020.9104155"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Narayan, S., Gagn\u00e9, M., and Safavi-Naini, R. (2010, January 8). Privacy preserving EHR system using attribute-based infrastructure. Proceedings of the 2010 ACM workshop on Cloud Computing Security Workshop, Chicago, IL, USA.","DOI":"10.1145\/1866835.1866845"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Grover, A., and Kaur, B. (2016, January 29\u201330). A framework for cloud data security. Proceedings of the Computing, Communication and Automation (ICCCA), Greater Noida, India.","DOI":"10.1109\/CCAA.2016.7813924"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Khanezaei, N., and Hanapi, Z.M. (2014, January 12\u201314). A framework based on RSA and AES encryption algorithms for cloud computing services. Proceedings of the Systems, Process and Control (ICSPC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/SPC.2014.7086230"},{"key":"ref_5","first-page":"19","article-title":"Cloud computing security using AES algorithm","volume":"67","author":"Abha","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zhao, F., Li, C., and Liu, C.F. (2014, January 16\u201319). A cloud computing security solution based on fully homomorphic encryption. Proceedings of the 16th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea.","DOI":"10.1109\/ICACT.2014.6779008"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kaur, R., and Singh, R.P. (2014, January 24\u201327). Enhanced cloud computing security and integrity verification via novel encryption techniques. Proceedings of the International Conference on Advances in Computing, Communications and Informatics, Delhi, India.","DOI":"10.1109\/ICACCI.2014.6968328"},{"key":"ref_8","first-page":"4302","article-title":"Cloud security with encryption using hybrid algorithm and secured endpoints","volume":"3","author":"Rani","year":"2012","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Zhao, H., and Xiong, J. (2016, January 25\u201327). Privacy-aware adaptive data encryption strategy of big data in cloud computing. Proceedings of the 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing, Beijing, China.","DOI":"10.1109\/CSCloud.2016.52"},{"key":"ref_10","unstructured":"Mohamed, M.E., Abdelkader, H.S., and El-Etriby, S. (2012, January 14\u201316). Enhanced data security model for cloud computing. Proceedings of the 8th International Conference on Informatics and Systems (INFOS), Giza, Egypt."},{"key":"ref_11","unstructured":"Kumar, D.A., Dubey, A.K., Namdev, M., and Shrivastava, S.S. (2012, January 5\u20137). Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. Proceedings of the 2012 CSI Sixth International Conference on Software Engineering (CONSEG), Indore, India."},{"key":"ref_12","unstructured":"Uma, S., Lakhani, K., and Mundra, M. (2010, January 28\u201330). Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. Proceedings of the 1st International Conference on Parallel Distributed and Grid Computing (PDGC), Solan, India."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.ins.2016.09.005","article-title":"Intelligent cryptography approach for secure distributed big data storage in cloud computing","volume":"387","author":"Li","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_14","first-page":"9852472","article-title":"An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment","volume":"2019","author":"Pradeep","year":"2019","journal-title":"J. Comput. Netw. Commun."},{"key":"ref_15","first-page":"1","article-title":"Data security in cloud computing using cryptographic algorithms","volume":"7","author":"Khan","year":"2019","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"key":"ref_16","first-page":"18","article-title":"Implementing encryption algorithms to enhance data security of cloud in cloud computing","volume":"70","author":"Manpreet","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.procs.2016.03.023","article-title":"Homomorphic encryption for security of cloud data","volume":"79","author":"Poteya","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-981-287-990-5_12","article-title":"Applying encryption algorithm for data security in cloud storage","volume":"366","author":"Kartit","year":"2015","journal-title":"Adv. Ubiquitous Netw. Lect. Notes Electr. Eng."},{"key":"ref_19","first-page":"40","article-title":"Improving the security of cloud computing by building new hybrid cryptography algorithms","volume":"8","author":"Salama","year":"2018","journal-title":"Int. J. Electron. Inf. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Das, D. (2018, January 10\u201312). Secure cloud computing algorithm using homomorphic encryption and multi-party computation. Proceedings of the International Conference on Information Networking (ICOIN), Chiang Mai, Thailand.","DOI":"10.1109\/ICOIN.2018.8343147"},{"key":"ref_21","first-page":"203","article-title":"The proposed model increase security of sensitive data in cloud computing","volume":"9","author":"Hyseni","year":"2018","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_22","first-page":"12","article-title":"Security issues and challenges in cloud computing","volume":"2","author":"Murthy","year":"2015","journal-title":"Int. Adv. Res. J. Sci. Eng. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., and Lou, W. (2010, January 14\u201319). Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of the IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Purushothama, B., and Amberker, B. (2012, January 17\u201318). Efficient query processing on outsourced encrypted data in cloud with privacy preservation. Proceedings of the International Symposium on Cloud and Services Computing, Mangalore, India.","DOI":"10.1109\/ISCOS.2012.16"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Tebaa, M., Hajji, S.E., and Ghazi, A.E. (2012, January 20\u201321). Homomorphic encryption method applied to Cloud Computing. Proceedings of the 2012 National Days of Network Security and Systems, Marrakech, Morocco.","DOI":"10.1109\/JNS2.2012.6249248"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.procs.2016.07.335","article-title":"A study on data storage security issues in cloud computing","volume":"92","author":"Naresh","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.procs.2015.04.171","article-title":"Data security challenges and its solutions in cloud computing","volume":"48","author":"Rao","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1002\/cpe.1698","article-title":"Achieving fine grained access control for secure data sharing on cloud servers","volume":"23","author":"Wang","year":"2011","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.procs.2017.06.124","article-title":"A comprehensive survey on security in cloud computing","volume":"110","author":"Gururaj","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_30","first-page":"22","article-title":"Cloud computing security challenges in higher educational institutions\u2014A survey","volume":"161","author":"Khalil","year":"2017","journal-title":"Int. J. Comput. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.jpdc.2019.10.001","article-title":"Profit-aware application placement for integrated fog\u2013cloud computing environments","volume":"135","author":"Mahmud","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Hussain, S., Ullah, S.S., Uddin, M., Iqbal, J., and Chen, C.-L. (2022). A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks. Sensors, 22.","DOI":"10.3390\/s22031072"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Uddin, M., Khalique, A., Jumani, A.K., Ullah, S.S., and Hussain, S. (2021). Next-Generation Blockchain-Enabled Virtualized Cloud Security Solutions: Review and Open Challenges. Electronics, 10.","DOI":"10.3390\/electronics10202493"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"121571","DOI":"10.1016\/j.jclepro.2020.121571","article-title":"Towards automated aquaponics: A review on monitoring, IoT, and smart systems","volume":"263","author":"Yanes","year":"2020","journal-title":"J. Clean. Prod."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ma, L., Wang, X., Wang, X., Wang, L., Shi, Y., and Huang, M. (2021). TCDA: Truthful combinatorial double auctions for mobile edge computing in industrial Internet of Things. IEEE Trans. Mob. Comput.","DOI":"10.1109\/TMC.2021.3064314"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Munoz, A., Mana, A., and Gonz\u00e1lez, J. (2013). Dynamic Security Properties Monitoring Architecture for Cloud Computing. Security Engineering for Cloud Computing, IGI Global.","DOI":"10.4018\/978-1-4666-2125-1.ch001"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Lopez, J., Mana, A., and Munoz, A. (2006, January 3\u20136). A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. Proceedings of the Third International Conference on Ubiquitous Intelligence and Computing, Wuhan, China.","DOI":"10.1007\/11833529_99"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"93230","DOI":"10.1109\/ACCESS.2020.2994988","article-title":"A lightweight and formally secure certificate based signcryption with proxy re-encryption (CBSRE) for Internet of Things enabled smart grid","volume":"8","author":"Hussain","year":"2020","journal-title":"IEEE Access"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/4\/695\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:44:52Z","timestamp":1760136292000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/4\/695"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,28]]},"references-count":38,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["sym14040695"],"URL":"https:\/\/doi.org\/10.3390\/sym14040695","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,28]]}}}