@article{2895, author = {Shruthi M,, Demian Antony D’Mello}, title = {Techniques for Data Privacy Preserving in Cloud Computing Environments}, journal = {Information Security Education Journal}, year = {2019}, volume = {6}, number = {2}, doi = {https://doi.org/10.6025/isej/2019/6/2/37-48}, url = {http://www.dline.info/isej/fulltext/v6n2/isejv6n2_1.pdf}, abstract = {Cloud Computing renders useful services over the Internet by increasing resource utilization and computational services at a decreased cost along different sectors. Data owners outsource their private data on cloud environment leading to loss of physical control over data. Security solutions provided in the literature to safeguard the data mainly focus on authentication and authorization. Data privacy preservation is one of the key areas in providing data security to ensure privacy guarantees for sensitive data namely health records, financial data, personal identities by providing strong end-to-end privacy. In this paper, the authors classify challenges in data privacy preservation based on the nature of mechanisms and type of data stored in cloud environments. The paper presents a detailed analysis of the literature in terms of methodologies adopted, algorithms proposed and cloud security performance metrics.}, }