The Effect of Using End-to-End Encryption in Improving Data Security in Cloud Computing
Abstract
Cloud Computing offers various advantages, but also presents major challenges related to data security. End-to-end encryption (E2EE) is considered as a solution to mitigate threats to the security of data stored and processed in the cloud. This research aims to examine the effect of implementing E2EE encryption in improving data security in Cloud Computing. Using a qualitative approach with literature study and secondary data analysis, this research focuses on three main threat categories: data leakage, unauthorized access, and cyberattacks. The results show that E2EE encryption can reduce the incidence of data leakage by 80%, unauthorized access by 83.3%, and cyberattacks by 78.6%. Despite its effectiveness, E2EE encryption implementation faces challenges in encryption key management and potential degradation in system performance. Therefore, good key management and multifactor authentication are essential to ensure data security. This study concludes that although end-to-end encryption improves security, a thorough policy, including key management and access control, is needed to maximize data protection in Cloud Computing.
References
Ahmad, M., Pervez, Z., Lee, S., & Kang, B. (2015). Task-oriented access model for secure data sharing over cloud.. https://doi.org/10.1145/2701126.2701186
Alemami, Y., Al-Ghonmein, A., Al-Moghrabi, K., & Mohamed, M. (2023). Cloud data security and various cryptographic algorithms. International Journal of Electrical and Computer
Eya, N. and Weir, G. (2021). End-user authentication control in cloud-based erp systems., 1-6. https://doi.org/10.1109/nccc49330.2021.9428846
Kalaiprasath, R., Elankavi, R., & Udayakumar, R. (2017). Cloud security and compliance - a semantic approach in end to end security. International Journal on Smart Sensing and Intelligent Systems, 10(5), 482-494. https://doi.org/10.21307/ijssis-2017-265
Kara, M., Laouid, A., Yagoub, M., Euler, R., Medileh, S., Hammoudeh, M., … & Bounceur, A. (2021). A fully homomorphic encryption based on magic number fragmentation and el?gamal encryption: smart healthcare use case. Expert Systems, 39(5). https://doi.org/10.1111/exsy.12767
Lanjekar, A., Thakur, A., Koli, Y., & Katti, J. (2017). Electronic medical reports security in cloud storage environment based on visual cryptography. International Journal of Computer Applications, 179(6), 30-33. https://doi.org/10.5120/ijca2017915969
Paul, P. and Aithal, P. (2019). Cloud security: an overview and current trend. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3497705
Sinha, S. (2023). Secure cloud storage using end-to-end encryption. International Journal for Research in Applied Science and Engineering Technology, 11(12), 567-574. https://doi.org/10.22214/ijraset.2023.57414
Suma, M. and Madhumathy, P. (2022). Brakerski?gentry?vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted internet of things services using glow?worm swarm optimization. Transactions on Emerging Telecommunications Technologies, 33(12). https://doi.org/10.1002/ett.4641
Yang, P., Gui, X., An, J., & Tian, F. (2017). An efficient secret key homomorphic encryption used in image processing service. Security and Communication Networks, 2017, 1-11. https://doi.org/10.1155/2017/7695751
Copyright (c) 2025 Satya Arisena Hendrawan, Legito, Muhammad Bitrayoga, Jatmiko Wahyu Nugroho, Arnes Yuli Vandika

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.