Naval University of Engineering
The data secrecy of outsourced files in cloud server should be protected even though cloud servers are untrustworthy. In this paper, the authors extensively analyze the techniques on data privacy protection for secure cloud storage. They propose and compare several general paradigms on data secrecy protection including ID-based scheme, CLPKC-based scheme, key-escrow-based scheme, ID-based threshold decryption scheme, and trusted third party based scheme. After the analysis and comparison, ID-based threshold decryption scheme has the most advantages with respect to no constraints such as certificate and key escrow.