Abid Hussain,
- Professor, School of Computer Application & Technology, Career Point University, Kota, Rajasthan, India
Abstract
Cloud computing is a technology that provides a lot of configurable resources, enabling decentralized data execution and space. Cloud technologies have transformed the ideas of internal data storage and access to provide businesses with flexibility and efficiency. Thanks to cloud services like DBaaS, users may make use of advanced database features without having to worry about the burden of traditional databases. With more organizations moving to the usage of Cloud Database Management Systems (CDBMS) to administer as well as scale their data infrastructures, the issue of data privacy and security has gained different magnitudes. This study examines the topography of changing privacy threats in cloud settings, such as information breaches, internal assaults, illegal provider entrance, query deduction, metadata disclosures, and duty management concerns. Some privacy-preserving solutions, including cryptography solutions, access control, anonymization techniques, secure multi-party computing, and secure execution environments, have been established to protect against such risks. The study classifies the solutions and analyzes their strengths, weaknesses, and areas in the context of cloud databases. Even when great progress has been made, there has been little real-world implementation because of such issues as performance-security trade-offs, insufficient standardization, inability to support complex queries, and key management problems.
Keywords: Cloud database management systems (CDBMS), privacy preservation, data breaches, cryptographic techniques, homomorphic encryption, access control, secure multi-party computation, trusted execution environments, anonymization, regulatory compliance, data security
[This article belongs to Journal of Web Engineering & Technology ]
Abid Hussain. Advancements in Privacy-Preserving Techniques for Cloud Database Management Systems: A Review Analysis. Journal of Web Engineering & Technology. 2025; 13(01):11-22.
Abid Hussain. Advancements in Privacy-Preserving Techniques for Cloud Database Management Systems: A Review Analysis. Journal of Web Engineering & Technology. 2025; 13(01):11-22. Available from: https://journals.stmjournals.com/jowet/article=2025/view=229306
References
- Kumar K, Pandey BK, editors. Next Generation Mechanisms for Data Encryption. CRC Press; 2025 Jan 24.
- Murri S. Data Security Challenges and Solutions in Big Data Cloud Environments. Int J Curr Eng Technol. 2022 Jun; 12(06): 565–574.
- Dunsin M. Comparative Analysis of Privacy-Preserving Techniques in Cloud Computing: Challenges and Future Directions. 03/02/2025
- Thokala VS. Scalable Cloud Deployment and Automation for E-Commerce Platforms Using AWS, Heroku, and Ruby on Rails. Int J Adv Res Sci Commun Technol. 2023 Oct; 3(2): 349–62.
- Chatterjee S. Risk management in advanced persistent threats (apts) for critical infrastructure in the utility industry. Int J Multidiscip Res. 2021; 3(4): 1–10.
- Marpaung OS, Alvyn DA, William V, Anggereainy MS, Kurniawan A. Security and Privacy Issues in Cloud-Based Databases: A Literature Review. In 2023 IEEE 10th International Conference on ICT for Smart Society (ICISS). 2023 Sep 6; 1–6.
- Ratheesh R. Privacy-Preserving Analysis Technique for Secure, Cloud-based Data Mining with Cloud Service Provider. J Inf Syst Eng Manag. 2025 Feb 1; 10(2): 215–23. Available from: https://jisem-journal.com/index.php/journal/article/view/1750
- Khare P, Abhishek. Cloud Security Challenges: Implementing Best Practices for Secure SaaS Application Development. Int J Curr Eng Technol. 2021; 11(06): 669–676.
- Pasham SD. Privacy-preserving data sharing in big data analytics: A distributed computing approach. Metascience. 2023 Dec 19; 1(1): 149–84.
- Gogineni A. Multi-Cloud Deployment with Kubernetes: Challenges, Strategies, and Performance Optimization. Int Sci J Eng Manag. 2022; 1(02): 1–6.
- Neeli SS. Critical Cybersecurity Strategies for Database Protection against Cyber Attacks. J Artif Intell Mach Learn Data Sci. 2023; 1(1): 2102–2106.
- Kabade S, Sharma A, Kagalkar A. Intelligent Automation in Pension Service Purchases with AI and Cloud Integration for Operational Excellence. Int J Adv Res Sci Commun Technol. 2023 Dec; 3(1): 725–735.
- Joshi B, Joshi B, Mishra A, Arya V, Gupta AK, Peraković D. A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. Int J Cloud Appl Comput. 2022;12(1):1–11. doi: 10.4018/IJCAC.309936.
- Duggasani AR. Scalable and Optimized Load Balancing in Cloud Systems: Intelligent Nature-Inspired Evolutionary Approach. Int J Innov Sci Res Technol. 2025 May 28; 10(5): 2153–60.
- Dewangan RR, Soni S, Mishal A. An approach of privacy preservation and data security in cloud computing for secured data sharing. Recent Adv Electr Electron Eng. 2025 Feb; 18(2): 176–95.
- Alam S, Bhatia S, Shuaib M, Khubrani MM, Alfayez F, Malibari AA, Ahmad S. An overview of blockchain and IoT integration for secure and reliable health records monitoring. Sustainability. 2023 Mar 23; 15(7): 5660.
- Garg S. Predictive Analytics and Auto Remediation using Artificial Intelligence and Machine learning in Cloud Computing Operations. Available at SSRN 5267117. 2019 Apr 1.
- Amaithi Rajan A, V V. Systematic survey: secure and privacy-preserving big data analytics in cloud. J Comput Inf Syst. 2024 Jan 2; 64(1): 136–56.
- Tong Q, Miao Y, Li H, Liu X, Deng RH. Privacy-preserving ranked spatial keyword query in mobile cloud-assisted fog computing. IEEE Trans Mob Comput. 2021 Dec 13; 22(6): 3604–18.
- Prajapati V. Cloud-Based Database Management: Architecture, Security, challenges and solutions. J Glob Res Electron Commun. 2025; 1(1): 07–13.
- Bi R, Xiong J, Tian Y, Li Q, Liu X. Edge-cooperative privacy-preserving object detection over random point cloud shares for connected autonomous vehicles. IEEE Trans Intell Transp Syst. 2022 Oct 25; 23(12): 24979–90.
- Sola RP, Malali N, Madugula P. Cloud Database Security: Integrating Deep Learning and Machine Learning for Threat Detection and Prevention: 0. Notion Press; 2025 Feb 22.
- Lin L, Zhang X. PPVerifier: A privacy-preserving and verifiable federated learning method in cloud-edge collaborative computing environment. IEEE Internet Things J. 2022 Dec 30; 10(10): 8878–92.
- Malali N, Praveen Madugula SR. Robustness and Adversarial Resilience of Actuarial AI/ML Models in the Face of Evolving Threats. Int J Innov Sci Res Technol. 2025 Mar 25; 10(3): 910–6.
- Menghnani M. Modern Full Stack Development Practices for Scalable and Maintainable Cloud-Native Applications. Int J Innov Sci Res Technol. 2025; 10(2): 1206–16.
- Hosam O, BinYuan F. A comprehensive analysis of trusted execution environments. In 2022 IEEE 8th International Conference on Information Technology Trends (ITT). 2022 May 25; 61–66.
- Shah SB. Machine Learning for Cyber Threat Detection and Prevention in Critical Infrastructure. J Glob Res Electron Commun. 2025 Feb; 2(2): 1–7.
- Patel N. Secure access service edge (SASE): Evaluating the impact of converged network security architectures in cloud computing. Int J Emerg Technol Innov Res. 2024;11(3):e703–e714.
- Patel R. Advancements in Renewable Energy Utilization for Sustainable Cloud Data Centers: A Survey of Emerging Approaches. Int J Curr Eng Technol. 2023 Oct; 13(5): 447–54.
- Maddali G. An Efficient Bio-Inspired Optimization Framework for Scalable Task Scheduling in Cloud Computing Environments. Available at SSRN 5276651. 2025 May 15.
- Li H, He D, Feng Q, Yang X, Luo Q. A Dynamic and Secure Join Query Protocol for Multi-User Environment in Cloud Computing. IEEE Transactions on Cloud Computing. 2025 Feb 21; 13(2): 512–525.
- Uthej K, Keerthan NK, Musunuru NK, Beena BM. Cloud-Infused AWS Services: Automobile Database Management System. In 2024 IEEE 2nd International Conference on Networking, Embedded and Wireless Systems (ICNEWS). 2024 Aug 22; 1–7.
- Vyas A, Lin PC, Hwang RH, Tripathi M. Privacy-preserving federated learning for intrusion detection in IoT environments: a survey. IEEE Access. 2024 Sep 4; 12: 127018–127050.
- Sasikumar K, Nagarajan S. Comprehensive review and analysis of cryptography techniques in cloud computing. IEEE Access. 2024 Apr 5; 12: 52325–51.
- Afzal MU, Abdellatif AA, Zubair M, Mehmood MQ, Massoud Y. Privacy and security in distributed learning: A review of challenges, solutions, and open research issues. IEEE Access. 2023 Oct 11; 11: 114562–81.
- Mishra A, Jabar TS, Alzoubi YI, Mishra KN. Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework. Concurr Comput: Pract Exp. 2023 Nov 30; 35(26): e7831.
- Ming C, Lei Z, Feng X, Xiaonan S, Qing L. Research on smart power grid big data information management system based on computer cloud security database technology. In 2023 IEEE 3rd International Conference on Data Science and Computer Application (ICDSCA). 2023 Oct 27; 1556–1561.

Journal of Web Engineering & Technology
| Volume | 13 |
| Issue | 01 |
| Received | 11/07/2025 |
| Accepted | 30/09/2025 |
| Published | 15/10/2025 |
| Publication Time | 96 Days |
Login
PlumX Metrics