Abstract
Due to the rise of Internet of Things networks, targeting vulnerabilities related to the limitation of resources in devices has increased. Therefore, it is necessary to delegate encryption services to cloud and fog platforms. Encryption as a Service (EaaS) provides all cryptographic services to end-users to help them cope with their limited resources and processing capabilities. This paper reviews the existing research on EaaS platforms and categorizes them based on their underlying encryption algorithm types. We also introduce different EaaS architectures based on the location of the main components. To our knowledge, none of the existing surveys in this field have covered the aforementioned features.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Al-Shabi, M.: A survey on symmetric and asymmetric cryptography algorithms in information security. Int. J. Sci. Res. Publ. (IJSRP) 9(3), 576–589 (2019)
Ateeq, K., Pradhan, M.R., Mago, B., Ghazal, T.: Encryption as a service for multi-cloud environment. Int. J. Adv. Res. Eng. Technol. (IJARET) 11(7), 622–628 (2020)
Blömer, J., Günther, P., Krummel, V., Löken, N.: Attribute-based encryption as a service for access control in large-scale organizations. In: Imine, A., Fernandez, J.M., Marion, J.-Y., Logrippo, L., Garcia-Alfaro, J. (eds.) FPS 2017. LNCS, vol. 10723, pp. 3–17. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75650-9_1
Deb, P.K., Mukherjee, A., Misra, S.: CEaaS: constrained encryption-as-a-service in fog-enabled IoT. IEEE Internet Things J. 9, 19803–19810 (2022)
Ibtihal, M., Hassan, N.: Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. In: Cryptography: Breakthroughs in Research and Practice, pp. 316–330. IGI Global (2020)
Ihtesham, M., et al.: Privacy preserving and serverless homomorphic-based searchable encryption as a service (SEaaS). IEEE Access 11, 115204–115218 (2023)
Javadpour, A., Ja’fari, F., Taleb, T., Shojafar, M., Benzaïd, C.: A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput. Secur. 140, 103792 (2024)
Javadpour, A., Ja’fari, F., Taleb, T., Shojafar, M., Yang, B.: SCEMA: an SDN-oriented cost-effective edge-based MTD approach. IEEE Trans. Inf. Forensics Secur. 18, 667–682 (2022)
Javadpour, A., Ja’fari, F., Taleb, T., Zhao, Y., Bin, Y., Benzaïd, C.: Encryption as a service for IoT: opportunities, challenges and solutions. IEEE Internet Things J 11, 7525–7558 (2023)
Olanrewaju, R.F., Islam, T., Khalifa, O.O., Anwar, F., Pampori, B.R.: Cryptography as a service (CaaS): quantum cryptography for secure cloud computing. Indian J. Sci. Technol. 10(7), 1–6 (2017)
Patel, A., et al.: Safeguarding the IoT: taxonomy, security solutions, and future research opportunities. Secur. Priv. 7(2), e354 (2024)
Raddo, T.R., Rommel, S., Land, V., Okonkwo, C., Monroy, I.T.: Quantum data encryption as a service on demand: Eindhoven QKD network testbed. In: 2019 21st International Conference on Transparent Optical Networks (ICTON), pp. 1–5. IEEE (2019)
Rahimi, N., Reed, J.J., Gupta, B.: On the significance of cryptography as a service. J. Inf. Secur. 9(4), 242–256 (2018)
Ralegankar, V.K., et al.: Quantum cryptography-as-a-service for secure UAV communication: applications, challenges, and case study. IEEE Access 10, 1475–1492 (2021)
Saxena, U.R., Alam, T.: Role-based access using partial homomorphic encryption for securing cloud data. Int. J. Syst. Assur. Eng. Manage. 14(3), 950–966 (2023)
Sbai, A., Drocourt, C., Dequen, G.: Pre as a service within smart grid city. In: 16th International Conference on Security and Cryptography, pp. 394–401. SCITEPRESS-Science and Technology Publications (2019)
Sbai, A., Drocourt, C., Dequen, G.: Cloud file sharing using PREaaS. EHEI J. Sci. Technol. 1(2), 52–63 (2021)
Tahir, S., Ruj, S., Sajjad, A., Rajarajan, M.: Fuzzy keywords enabled ranked searchable encryption scheme for a public cloud environment. Comput. Commun. 133, 102–114 (2019)
Tahir, S., Steponkus, L., Ruj, S., Rajarajan, M., Sajjad, A.: A parallelized disjunctive query based searchable encryption scheme for big data. Futur. Gener. Comput. Syst. 109, 583–592 (2020)
Thabit, F., Can, O., Aljahdali, A.O., Al-Gaphari, G.H., Alkhzaimi, H.A.: A comprehensive literature survey of cryptography algorithms for improving the IoT security. Internet of Things 22, 100759 (2023)
Unal, D., Al-Ali, A., Catak, F.O., Hammoudeh, M.: A secure and efficient internet of things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Futur. Gener. Comput. Syst. 125, 433–445 (2021)
Xu, R., Joshi, J.B.: Enabling attribute based encryption as an internet service. In: 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp. 417–425. IEEE (2016)
Yang, B., Zhang, F., Khan, S.U.: An encryption-as-a-service architecture on cloud native platform. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1–7. IEEE (2021)
Zhang, H., Qin, B., Tu, T., Guo, Z., Gao, F., Wen, Q.: An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications. IEEE Trans. Industr. Inf. 16(1), 658–668 (2019)
Acknowledgment
This research work is partially supported by the European Union’s Horizon Europe research and innovation program HORIZON-JU-SNS-2022 under the RIGOUROUS project (Grant No. 101095933). The paper reflects only the authors’ views. The Commission is not responsible for any use that may be made of the information it contains.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Javadpour, A., Ja’fari, F., Taleb, T. (2024). Encryption as a Service: A Review of Architectures and Taxonomies. In: Martins, R., Selimi, M. (eds) Distributed Applications and Interoperable Systems. DAIS 2024. Lecture Notes in Computer Science, vol 14677. Springer, Cham. https://doi.org/10.1007/978-3-031-62638-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-62638-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-62637-1
Online ISBN: 978-3-031-62638-8
eBook Packages: Computer ScienceComputer Science (R0)