The Effect of Using End-to-End Encryption in Improving Data Security in Cloud Computing

  • Satya Arisena Hendrawan Teknologi dan Informasi, Universitas Siber Indonesia
  • Legito Sains dan Teknologi, Universitas Tjut Nyak Dhien Medan
  • Muhammad Bitrayoga Ilmu Komputer, Universitas Serelo Lahat
  • Jatmiko Wahyu Nugroho Bisnis, Pariwisata, Pendidikan dan Humaniora, Universitas Dhyana Pura
  • Arnes Yuli Vandika Universitas Bandar Lampung
Keywords: Data Security, Cloud Computing, Cyber Attack, Key Management

Abstract

Cloud Computing offers various advantages, but also presents major challenges related to data security. End-to-end encryption (E2EE) is considered as a solution to mitigate threats to the security of data stored and processed in the cloud. This research aims to examine the effect of implementing E2EE encryption in improving data security in Cloud Computing. Using a qualitative approach with literature study and secondary data analysis, this research focuses on three main threat categories: data leakage, unauthorized access, and cyberattacks. The results show that E2EE encryption can reduce the incidence of data leakage by 80%, unauthorized access by 83.3%, and cyberattacks by 78.6%. Despite its effectiveness, E2EE encryption implementation faces challenges in encryption key management and potential degradation in system performance. Therefore, good key management and multifactor authentication are essential to ensure data security. This study concludes that although end-to-end encryption improves security, a thorough policy, including key management and access control, is needed to maximize data protection in Cloud Computing.

References

Ahmad, M., Pervez, Z., Lee, S., & Kang, B. (2015). Task-oriented access model for secure data sharing over cloud.. https://doi.org/10.1145/2701126.2701186

Alemami, Y., Al-Ghonmein, A., Al-Moghrabi, K., & Mohamed, M. (2023). Cloud data security and various cryptographic algorithms. International Journal of Electrical and Computer

Eya, N. and Weir, G. (2021). End-user authentication control in cloud-based erp systems., 1-6. https://doi.org/10.1109/nccc49330.2021.9428846

Kalaiprasath, R., Elankavi, R., & Udayakumar, R. (2017). Cloud security and compliance - a semantic approach in end to end security. International Journal on Smart Sensing and Intelligent Systems, 10(5), 482-494. https://doi.org/10.21307/ijssis-2017-265

Kara, M., Laouid, A., Yagoub, M., Euler, R., Medileh, S., Hammoudeh, M., … & Bounceur, A. (2021). A fully homomorphic encryption based on magic number fragmentation and el?gamal encryption: smart healthcare use case. Expert Systems, 39(5). https://doi.org/10.1111/exsy.12767

Lanjekar, A., Thakur, A., Koli, Y., & Katti, J. (2017). Electronic medical reports security in cloud storage environment based on visual cryptography. International Journal of Computer Applications, 179(6), 30-33. https://doi.org/10.5120/ijca2017915969

Paul, P. and Aithal, P. (2019). Cloud security: an overview and current trend. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3497705

Sinha, S. (2023). Secure cloud storage using end-to-end encryption. International Journal for Research in Applied Science and Engineering Technology, 11(12), 567-574. https://doi.org/10.22214/ijraset.2023.57414

Suma, M. and Madhumathy, P. (2022). Brakerski?gentry?vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted internet of things services using glow?worm swarm optimization. Transactions on Emerging Telecommunications Technologies, 33(12). https://doi.org/10.1002/ett.4641

Yang, P., Gui, X., An, J., & Tian, F. (2017). An efficient secret key homomorphic encryption used in image processing service. Security and Communication Networks, 2017, 1-11. https://doi.org/10.1155/2017/7695751

Published
2025-01-30
How to Cite
Satya Arisena Hendrawan, Legito, Muhammad Bitrayoga, Jatmiko Wahyu Nugroho, & Arnes Yuli Vandika. (2025). The Effect of Using End-to-End Encryption in Improving Data Security in Cloud Computing. International Journal of Health, Economics, and Social Sciences (IJHESS), 7(1), 418~423. https://doi.org/10.56338/ijhess.v7i1.6941
Section
Articles