DATA PRIVACY IN CLOUD COMPUTING – CHALLENGES AND SOLUTION
Abstract
The move to the cloud has reshaped how organizations think about storage and processing. Servers once confined to dusty basement cages now spin up at a click, cutting both cost and hassle. Still, that freedom comes with a lurking worry, mainly who can snoop once the files drift off-campus. Sensitive payroll databases, medical records, even personal phone numbers often rest on hardware the owner will never see. Classic access controls-fixes like passwords, single sign-ons, even VPNs-crumble when dozens of partners shift roles by the hour. A janitor today might be an auditor tomorrow, and permissions stitched for one job can leak during the hand-off. This study sketches a decentralized model where trust is scattered rather than collected. Keys live with multiple guardians spread across the supply chain, so no single hacker can pop the lock. Tokens that change every transaction act like sand in a replay timer, grinding repeated knocks to dust. Users can write a memo, tag a teammate, or shred a draft without the cloud knowing who handled what bit. Benchmarks show the design slows encryption by milliseconds, hardly noticeable in an eight-core workstation. Sections below walk through every circuit and ledger line, then explore how blockchain and machine learning might tighten the screws even further.
Keywords - Cloud Computing, Data Privacy, Access Control, Anonymous Authentication, Decentralized Architecture, Key Distribution Center (KDC), Cloud Security.