{"id":"https://openalex.org/W7106230640","doi":"https://doi.org/10.1186/s13677-025-00774-5","title":"Cloud data privacy protection with homomorphic algorithm: a systematic literature review","display_name":"Cloud data privacy protection with homomorphic algorithm: a systematic literature review","publication_year":2025,"publication_date":"2025-11-22","ids":{"openalex":"https://openalex.org/W7106230640","doi":"https://doi.org/10.1186/s13677-025-00774-5"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00774-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00774-5","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1186/s13677-025-00774-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Michael Ayitey Junior","orcid":null},"institutions":[{"id":"https://openalex.org/I291863076","display_name":"University of Energy and Natural Resources","ror":"https://ror.org/05r9rzb75","country_code":"GH","type":"education","lineage":["https://openalex.org/I291863076"]}],"countries":["GH"],"is_corresponding":true,"raw_author_name":"Michael Ayitey Junior","raw_affiliation_strings":["Department of Information Technology and Decision Sciences, University of Energy and Natural Resources, Sunyani, Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology and Decision Sciences, University of Energy and Natural Resources, Sunyani, Ghana","institution_ids":["https://openalex.org/I291863076"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Peter Appiahene","orcid":null},"institutions":[{"id":"https://openalex.org/I291863076","display_name":"University of Energy and Natural Resources","ror":"https://ror.org/05r9rzb75","country_code":"GH","type":"education","lineage":["https://openalex.org/I291863076"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Peter Appiahene","raw_affiliation_strings":["Department of Information Technology and Decision Sciences, University of Energy and Natural Resources, Sunyani, Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology and Decision Sciences, University of Energy and Natural Resources, Sunyani, Ghana","institution_ids":["https://openalex.org/I291863076"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Obed Appiah","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164771","display_name":"Sunyani Technical University","ror":"https://ror.org/05sc3yb31","country_code":"GH","type":"education","lineage":["https://openalex.org/I4210164771"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Obed Appiah","raw_affiliation_strings":["Department of Computer Science and Informatics, Sunyani, Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Informatics, Sunyani, Ghana","institution_ids":["https://openalex.org/I4210164771"]}]},{"author_position":"last","author":{"id":null,"display_name":"Kwabena Adu","orcid":null},"institutions":[{"id":"https://openalex.org/I291863076","display_name":"University of Energy and Natural Resources","ror":"https://ror.org/05r9rzb75","country_code":"GH","type":"education","lineage":["https://openalex.org/I291863076"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Kwabena Adu","raw_affiliation_strings":["Department of Information Technology and Decision Sciences, University of Energy and Natural Resources, Sunyani, Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology and Decision Sciences, University of Energy and Natural Resources, Sunyani, Ghana","institution_ids":["https://openalex.org/I291863076"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I291863076"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":6.2328,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96664238,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9556000232696533,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9556000232696533,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.01510000042617321,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.011800000444054604,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8833000063896179},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7031999826431274},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6998999714851379},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5351999998092651},{"id":"https://openalex.org/keywords/systematic-review","display_name":"Systematic review","score":0.4918999969959259},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.47600001096725464},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4316999912261963},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.42649999260902405}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8833000063896179},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7444999814033508},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7031999826431274},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6998999714851379},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6320000290870667},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5351999998092651},{"id":"https://openalex.org/C189708586","wikidata":"https://www.wikidata.org/wiki/Q1504425","display_name":"Systematic review","level":3,"score":0.4918999969959259},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.47600001096725464},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4316999912261963},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.42649999260902405},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.3736000061035156},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3366999924182892},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.32330000400543213},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.314300000667572},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.30880001187324524},{"id":"https://openalex.org/C56683213","wikidata":"https://www.wikidata.org/wiki/Q4143008","display_name":"Homomorphic filtering","level":4,"score":0.3068000078201294},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.25839999318122864}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00774-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00774-5","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9c306a9da1e1421487a2c5ecf870ad5b","is_oa":true,"landing_page_url":"https://doaj.org/article/9c306a9da1e1421487a2c5ecf870ad5b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 14, Iss 1, Pp 1-26 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00774-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00774-5","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8762978911399841,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":91,"referenced_works":["https://openalex.org/W2031533839","https://openalex.org/W2111764405","https://openalex.org/W2112967367","https://openalex.org/W2121022071","https://openalex.org/W2262035661","https://openalex.org/W2398150108","https://openalex.org/W2606485029","https://openalex.org/W2803262603","https://openalex.org/W2947744925","https://openalex.org/W2953899020","https://openalex.org/W2974731458","https://openalex.org/W3006187839","https://openalex.org/W3008629209","https://openalex.org/W3082845366","https://openalex.org/W3090949167","https://openalex.org/W3116168445","https://openalex.org/W3140934740","https://openalex.org/W3159848685","https://openalex.org/W3168458510","https://openalex.org/W3202324008","https://openalex.org/W3203400980","https://openalex.org/W4221055669","https://openalex.org/W4223972832","https://openalex.org/W4225377307","https://openalex.org/W4234211046","https://openalex.org/W4255997441","https://openalex.org/W4285138559","https://openalex.org/W4309858890","https://openalex.org/W4311113065","https://openalex.org/W4312123620","https://openalex.org/W4313825583","https://openalex.org/W4315786181","https://openalex.org/W4320919061","https://openalex.org/W4323350678","https://openalex.org/W4323662993","https://openalex.org/W4323768091","https://openalex.org/W4361199487","https://openalex.org/W4362583542","https://openalex.org/W4362719016","https://openalex.org/W4377704412","https://openalex.org/W4382930173","https://openalex.org/W4386134148","https://openalex.org/W4386495480","https://openalex.org/W4386624966","https://openalex.org/W4386857683","https://openalex.org/W4387705057","https://openalex.org/W4387737911","https://openalex.org/W4388193534","https://openalex.org/W4388568469","https://openalex.org/W4388857848","https://openalex.org/W4389890957","https://openalex.org/W4390007483","https://openalex.org/W4390043247","https://openalex.org/W4390155408","https://openalex.org/W4390270191","https://openalex.org/W4390599153","https://openalex.org/W4390603852","https://openalex.org/W4392767434","https://openalex.org/W4393180664","https://openalex.org/W4394575410","https://openalex.org/W4394689897","https://openalex.org/W4394770881","https://openalex.org/W4394833203","https://openalex.org/W4394925435","https://openalex.org/W4395090175","https://openalex.org/W4396728019","https://openalex.org/W4396751958","https://openalex.org/W4396952465","https://openalex.org/W4396982461","https://openalex.org/W4399250467","https://openalex.org/W4399306497","https://openalex.org/W4399426876","https://openalex.org/W4399427415","https://openalex.org/W4399853010","https://openalex.org/W4400205894","https://openalex.org/W4400339907","https://openalex.org/W4400491373","https://openalex.org/W4400681761","https://openalex.org/W4400771978","https://openalex.org/W4400835082","https://openalex.org/W4400911260","https://openalex.org/W4400976912","https://openalex.org/W4401497303","https://openalex.org/W4401540199","https://openalex.org/W4401612675","https://openalex.org/W4401729258","https://openalex.org/W4402124690","https://openalex.org/W4402494470","https://openalex.org/W4403669959","https://openalex.org/W4404469341","https://openalex.org/W4413845523"],"related_works":[],"abstract_inverted_index":{"This":[0],"article":[1,66,120],"critically":[2],"examines":[3],"the":[4,19,65,122,129],"increasing":[5],"reliance":[6],"on":[7,18,47],"cloud":[8,154],"computing":[9,155],"for":[10,44,116,124,136,148],"data":[11,49,149],"storage":[12],"and":[13,22,63,77,90,110,134,142,151],"processing,":[14],"with":[15],"a":[16,41,54,98],"focus":[17],"associated":[20],"security":[21,152],"privacy":[23,150],"challenges,":[24,105],"especially":[25],"when":[26],"handling":[27],"sensitive":[28],"data.":[29],"It":[30],"explores":[31],"homomorphic":[32,37,69],"encryption":[33,38,70,76],"(HE),":[34],"particularly":[35],"fully":[36],"(FHE),":[39],"as":[40,79,81,85,97],"promising":[42],"solution":[43],"enabling":[45],"computations":[46],"encrypted":[48],"without":[50],"compromising":[51],"confidentiality.":[52],"Through":[53],"systematic":[55],"literature":[56],"review":[57],"of":[58,131],"studies":[59],"published":[60],"between":[61],"2017":[62],"2024,":[64],"evaluates":[67],"various":[68],"algorithms,":[71],"assessing":[72],"their":[73],"effectiveness":[74],"in":[75,153],"decryption,":[78],"well":[80],"performance":[82],"metrics":[83],"such":[84],"execution":[86],"time,":[87],"communication":[88],"overhead,":[89],"energy":[91],"consumption.":[92],"The":[93,119],"findings":[94],"identify":[95],"FHE":[96],"widely":[99],"researched":[100],"technique,":[101],"yet":[102],"highlight":[103],"significant":[104],"including":[106],"high":[107],"computational":[108],"overhead":[109],"complexity,":[111],"which":[112],"limit":[113],"its":[114],"suitability":[115],"real-time":[117],"applications.":[118],"underscores":[121],"need":[123],"continued":[125],"research":[126],"to":[127,144],"enhance":[128],"efficiency":[130],"HE":[132],"algorithms":[133],"calls":[135],"collaborative":[137],"efforts":[138],"among":[139],"academia,":[140],"industry,":[141],"regulators":[143],"establish":[145],"robust":[146],"frameworks":[147],"environments.":[156]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-11-23T00:00:00"}
