Encryption as a Service: A Review of Architectures and Taxonomies | SpringerLink
Skip to main content

Encryption as a Service: A Review of Architectures and Taxonomies

  • Conference paper
  • First Online:
Distributed Applications and Interoperable Systems (DAIS 2024)

Abstract

Due to the rise of Internet of Things networks, targeting vulnerabilities related to the limitation of resources in devices has increased. Therefore, it is necessary to delegate encryption services to cloud and fog platforms. Encryption as a Service (EaaS) provides all cryptographic services to end-users to help them cope with their limited resources and processing capabilities. This paper reviews the existing research on EaaS platforms and categorizes them based on their underlying encryption algorithm types. We also introduce different EaaS architectures based on the location of the main components. To our knowledge, none of the existing surveys in this field have covered the aforementioned features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 10295
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7864
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Al-Shabi, M.: A survey on symmetric and asymmetric cryptography algorithms in information security. Int. J. Sci. Res. Publ. (IJSRP) 9(3), 576–589 (2019)

    Google Scholar 

  2. Ateeq, K., Pradhan, M.R., Mago, B., Ghazal, T.: Encryption as a service for multi-cloud environment. Int. J. Adv. Res. Eng. Technol. (IJARET) 11(7), 622–628 (2020)

    Google Scholar 

  3. Blömer, J., Günther, P., Krummel, V., Löken, N.: Attribute-based encryption as a service for access control in large-scale organizations. In: Imine, A., Fernandez, J.M., Marion, J.-Y., Logrippo, L., Garcia-Alfaro, J. (eds.) FPS 2017. LNCS, vol. 10723, pp. 3–17. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75650-9_1

    Chapter  Google Scholar 

  4. Deb, P.K., Mukherjee, A., Misra, S.: CEaaS: constrained encryption-as-a-service in fog-enabled IoT. IEEE Internet Things J. 9, 19803–19810 (2022)

    Article  Google Scholar 

  5. Ibtihal, M., Hassan, N.: Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. In: Cryptography: Breakthroughs in Research and Practice, pp. 316–330. IGI Global (2020)

    Google Scholar 

  6. Ihtesham, M., et al.: Privacy preserving and serverless homomorphic-based searchable encryption as a service (SEaaS). IEEE Access 11, 115204–115218 (2023)

    Article  Google Scholar 

  7. Javadpour, A., Ja’fari, F., Taleb, T., Shojafar, M., Benzaïd, C.: A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput. Secur. 140, 103792 (2024)

    Article  Google Scholar 

  8. Javadpour, A., Ja’fari, F., Taleb, T., Shojafar, M., Yang, B.: SCEMA: an SDN-oriented cost-effective edge-based MTD approach. IEEE Trans. Inf. Forensics Secur. 18, 667–682 (2022)

    Article  Google Scholar 

  9. Javadpour, A., Ja’fari, F., Taleb, T., Zhao, Y., Bin, Y., Benzaïd, C.: Encryption as a service for IoT: opportunities, challenges and solutions. IEEE Internet Things J 11, 7525–7558 (2023)

    Article  Google Scholar 

  10. Olanrewaju, R.F., Islam, T., Khalifa, O.O., Anwar, F., Pampori, B.R.: Cryptography as a service (CaaS): quantum cryptography for secure cloud computing. Indian J. Sci. Technol. 10(7), 1–6 (2017)

    Article  Google Scholar 

  11. Patel, A., et al.: Safeguarding the IoT: taxonomy, security solutions, and future research opportunities. Secur. Priv. 7(2), e354 (2024)

    Article  Google Scholar 

  12. Raddo, T.R., Rommel, S., Land, V., Okonkwo, C., Monroy, I.T.: Quantum data encryption as a service on demand: Eindhoven QKD network testbed. In: 2019 21st International Conference on Transparent Optical Networks (ICTON), pp. 1–5. IEEE (2019)

    Google Scholar 

  13. Rahimi, N., Reed, J.J., Gupta, B.: On the significance of cryptography as a service. J. Inf. Secur. 9(4), 242–256 (2018)

    Google Scholar 

  14. Ralegankar, V.K., et al.: Quantum cryptography-as-a-service for secure UAV communication: applications, challenges, and case study. IEEE Access 10, 1475–1492 (2021)

    Article  Google Scholar 

  15. Saxena, U.R., Alam, T.: Role-based access using partial homomorphic encryption for securing cloud data. Int. J. Syst. Assur. Eng. Manage. 14(3), 950–966 (2023)

    Article  Google Scholar 

  16. Sbai, A., Drocourt, C., Dequen, G.: Pre as a service within smart grid city. In: 16th International Conference on Security and Cryptography, pp. 394–401. SCITEPRESS-Science and Technology Publications (2019)

    Google Scholar 

  17. Sbai, A., Drocourt, C., Dequen, G.: Cloud file sharing using PREaaS. EHEI J. Sci. Technol. 1(2), 52–63 (2021)

    Google Scholar 

  18. Tahir, S., Ruj, S., Sajjad, A., Rajarajan, M.: Fuzzy keywords enabled ranked searchable encryption scheme for a public cloud environment. Comput. Commun. 133, 102–114 (2019)

    Article  Google Scholar 

  19. Tahir, S., Steponkus, L., Ruj, S., Rajarajan, M., Sajjad, A.: A parallelized disjunctive query based searchable encryption scheme for big data. Futur. Gener. Comput. Syst. 109, 583–592 (2020)

    Article  Google Scholar 

  20. Thabit, F., Can, O., Aljahdali, A.O., Al-Gaphari, G.H., Alkhzaimi, H.A.: A comprehensive literature survey of cryptography algorithms for improving the IoT security. Internet of Things 22, 100759 (2023)

    Article  Google Scholar 

  21. Unal, D., Al-Ali, A., Catak, F.O., Hammoudeh, M.: A secure and efficient internet of things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Futur. Gener. Comput. Syst. 125, 433–445 (2021)

    Article  Google Scholar 

  22. Xu, R., Joshi, J.B.: Enabling attribute based encryption as an internet service. In: 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp. 417–425. IEEE (2016)

    Google Scholar 

  23. Yang, B., Zhang, F., Khan, S.U.: An encryption-as-a-service architecture on cloud native platform. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1–7. IEEE (2021)

    Google Scholar 

  24. Zhang, H., Qin, B., Tu, T., Guo, Z., Gao, F., Wen, Q.: An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications. IEEE Trans. Industr. Inf. 16(1), 658–668 (2019)

    Article  Google Scholar 

Download references

Acknowledgment

This research work is partially supported by the European Union’s Horizon Europe research and innovation program HORIZON-JU-SNS-2022 under the RIGOUROUS project (Grant No. 101095933). The paper reflects only the authors’ views. The Commission is not responsible for any use that may be made of the information it contains.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Javadpour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Javadpour, A., Ja’fari, F., Taleb, T. (2024). Encryption as a Service: A Review of Architectures and Taxonomies. In: Martins, R., Selimi, M. (eds) Distributed Applications and Interoperable Systems. DAIS 2024. Lecture Notes in Computer Science, vol 14677. Springer, Cham. https://doi.org/10.1007/978-3-031-62638-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-62638-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-62637-1

  • Online ISBN: 978-3-031-62638-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics