References
Ahmad, I., Choi, W., & Shin, S. (2023). Comprehensive Analysis of Compressible Perceptual Encryption Methods Compression and Encryption Perspectives. Sensors, 23(8), 4057. Ahmed, N., Natarajan, T., & Rao, K. R. (1974). Discrete cosine transform. IEEE Transactions on Computers, C-23(1), 90–93. Aina, S. A., Adeniran, A. O., & Tunde, A. I. (2024). The impact of cloud computing on business agility: A case study approach. International Journal of Cloud Computing and Services Science, 13(1), 27-39. Alasmari, S. (2022). User Centered Security Service Level Agreement Enforcement Mechanisms (Doctoral dissertation, The University of North Carolina at Charlotte). Amazon Web Services. (2021). Collaborate with AWS Research and Academic Partners. Amazon Web Services. (2021). Shared responsibility model. https://aws.amazon.com/compliance/shared-responsibility-model/ Baritha, K., & Bhatia, R. (2023). A Systematic Review of Homomorphic Encryption and Its Contributions in Healthcare Industry. Complex & Intelligent Systems. Begum, M. B., Deepa, N., Uddin, M., Kaluri, R., Abdelhaq, M., & Alsaqour, R. (2023). An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm. Heliyon. Bohn, R. B., Messina, J. V., & Liu, F. (2021). The NIST Cloud Federation Reference Architecture. National Institute of Standards and Technology Special Publication, 500-332. Brakerski, Z., & Vaikuntanathan, V. (2011). Efficient fully homomorphic encryption from (standard) LWE. In Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS '11) (pp. 97–106). Chen, Y., Zhang, X., & Li, W. (2023). Enhancing Cloud Security with Homomorphic Encryption: Addressing Latency and Data Processing Efficiency. International Journal of Cloud Computing, 15(2), 101-119. Choudhary, S., & Singh, S. (2022). Cloud Computing Architecture: A Comprehensive Survey. International Journal of Computer Applications, 184(1), 1–7. Exploding Topics. (2024). Cloud computing trends in 2024: What to expect. Flinn, J. (2022). Cyber foraging: Bridging mobile and cloud computing. Springer Nature. Gao, H., & Wang, R. (2023). Cloud Computing Security: User Trust and Confidentiality in Data Storage and Transmission. Journal of Cloud Technology and Applications, 12(1), 67-85. Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st annual ACM symposium on Theory of computing (STOC '09) (pp. 169–178). Ghobaei-Arani, M., Yari, M., & Rajabion, L. (2021). Cloud computing security vulnerabilities: A systematic analysis. Journal of Information Security and Applications, 61, 102907. Grasso, I., & Gallo, G. (2023). Hybrid Compression Techniques for Efficient Multimedia Data Storage and Transmission. Multimedia Tools and Applications, 82(1), 123–145. Haris, M. A., Noor, N. S., & Saleh, R. (2024). Exploring security challenges in cloud computing environments: A systematic review. International Journal of Information Security, 23(1), 99-116. Huang, S. Y., Chen, C. L., & Lee, J. Y. (2023). NIST's service-based model: Implications for cloud computing security. Cloud Computing Advances, 12(4), 234-245. Huffman, D. A. (1952). A method for the construction of minimum-redundancy codes. Proceedings of the IRE, 40(9), 1098–1101. Kindervag, J. (2010). No more chewy centers: Introducing the zero-trust model of information security. Forrester Research. Kishore, T. K., & Guruprakash, C. D. (2019). A secure cloud storage retrieval using cost based iterative deepening depth-first search algorithm. International Journal of Engineering and Advanced Technology, 9(2), 2249–8958. Kumar, S., & Singh, R. (2024). Enhancing Data Security Using Hybrid Cryptographic Techniques: A Study on Vigenère and Polybius Ciphers. Journal of Information Security and Applications, 65, 103–118. Kumar, S., Gupta, R., & Sharma, P. (2021). Trust and Privacy in Cloud-Based Data Services: Risks and Mitigation Techniques. Cloud Security Journal, 8(3), 45-63. Lee, H., & Choi, J. (2022). User-Centric Security in Cloud Services: Balancing Usability and Confidentiality. Journal of Internet Security, 29(4), 289-302. Lin, Q., Zhao, J., & Wang, F. (2021). Homomorphic Encryption for Secure Data Processing in Cloud Environments. Advances in Cryptographic Research, 14(3), 159-175. Liu, X., Yang, G., Susilo, W., Tonien, J., Liu, X., & Shen, J. (2020). Privacy-preserving multi- keyword searchable encryption for distributed systems. IEEE Transactions on Parallel and Distributed Systems, 32(3), 561-574. Mukherjee, A., & Zhang, L. (2020). Data Compression and Security in Cloud Computing: Integrating Homomorphic Encryption. Journal of Computer Science and Cloud Technology, 7(4), 225-243. Munjal, K., & Bhatia, R. (2022). Analysing RSA and Paillier Homomorphic Property for Security in Cloud. Procedia Computer Science, 215, 240–246. Nayyar, A. (2021). Handbook of Cloud Computing: Basic to Advance research on the concepts and design of Cloud Computing. BPB Publications. Petrenko, S., Petrenko, A., & Petrenko, E. (2021). Lattice-Based Cryptography for IoT in a Quantum World: Are We Ready? IEEE Access, 9, 97065–97081. Qureshi, M. B., Qureshi, M. S., Tahir, S., Anwar, A., Hussain, S., Uddin, M., & Chen, C. L. (2022). Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry, 14(4), 695. Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. In Foundations of secure computation (pp. 169–180). Academic Press. Seth, B., Dalal, S., Jaglan, V., Le, D.-N., Mohan, S., & Srivastava, G. (2022). Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies, 33(4), e4108. Shafiq, D. A., Jhanjhi, N. Z., Abdullah, A., & Alzain, M. A. (2021). A load balancing algorithm for the data centres to optimize cloud computing applications. IEEE Access, 9, 41731-41744. Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27(3), 379–423. Singh, R., & Kapoor, P. (2020). Building User Trust in Cloud-Based Services: Security Strategies and Frameworks. Journal of Cybersecurity and Data Protection, 5(2), 94-110. Sunyaev, A., (2020). Cloud computing. Internet Computing: Principles of Distributed Systems and Emerging Internet-Based Technologies, 195-236. Thakur, D., Gupta, R., & Jain, A. (2023). Scalability and reliability in cloud computing. Cloud Computing Advances, 12(4), 234-245. Link to journal Trivedi, D., & Patel, S. (2024). Homomorphic Encryption: A Survey on Methods and Applications in Secure Data Processing. Journal of Information Security and Applications, 66, 104–120. Varghese, B., & Buyya, R. (2021). Next generation cloud computing: New trends and research directions. Journal of Cloud Computing, 10(1), 1–20. Venu, S., Reddy, P. V. G. D., & Kumar, K. S. (2022). Multi-party Computation Enables Secure Polynomial Control Based on Secret Sharing. arXiv preprint arXiv:2103.16335. Wang, Y., Zhao, T., & Lin, J. (2021). A Comparative Study on Cloud Data Security Solutions: Homomorphic Encryption and User-Centric Models. International Journal of Secure Computing, 13(2), 134-149. Yang, P., Xiong, N. N., & Ren, J. (2020). Data Security and Privacy Protection for Cloud Storage: A Survey. IEEE Access, 8, 131723–131740. Yao, A. C. (1982). Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (FOCS '82) (pp. 160–164). Yee, C. K., & Zolkipli, M. F. (2021). Review on confidentiality, integrity and availability in information security. Journal of Information and Communication Technology in Education, 8(2), 34-42. Zhou, Y., Chen, T., & Liu, H. (2023). Cloud data breach incidents