Research Article
Open access
Published on 7 April 2025
Download pdf
Chen,Y. (2025). Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security. Applied and Computational Engineering,145,51-56.
Export citation

Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security

Yilin Chen *,1,
  • 1 Beijing-Dublin International College, Beijing University of Technology, Beijing, China, 100124

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2755-2721/2025.21867

Abstract

In an era of rapid technological evolution, cloud computing has become indispensable across various industries due to its cost-efficiency, scalability, and accessibility. Yet, privacy and security concerns persist, as sensitive data can be susceptible to breaches and unauthorized access. At present, the two mainstream cloud computing architectures are centralized architecture and decentralized architecture. Both have advantages and disadvantages in terms of confidentiality, integrity and data availability. This paper employs a comparative analysis of these two architectures, synthesizing insights from recent studies and emphasizing the potential of emerging technologies like blockchain to strengthen privacy protection. By examining both architectures through a high-level lens, this study explores how decentralization, supported by distributed consensus mechanisms, can address vulnerabilities and enhance trust among stakeholders. It can be concluded that a decentralized approach, when underpinned by robust cryptographic methods, offers superior safeguards against evolving threats.

Keywords

centralized, decentralized, privacy, cloud computing

[1]. Hassan, J., Shehzad, D., Habib, U., Aftab, M. U., Ahmad, M., Kuleev, R., & Mazzara, M. (2022). The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR). Computational Intelligence and Neuroscience, 2022, 8303504. doi: 10.1155/2022/830350.

[2]. Alam, T. (2020). Cloud computing and its role in the information technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1(2), pp.108–115. doi:10.34306/itsdi.v1i2.103.

[3]. Ren, J., Zhang, D., He, S., Zhang, Y., & Li, T. (2019). A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet. ACM Computing Surveys, 52(6), 125, pp.1–36. DOI: 10.1145/336203.

[4]. Prasser, F., Eicher, J., Spengler, H., Bild, R., & Kuhn, K. A. (2020). Flexible data anonymization using ARX—Current status and challenges ahead. Software: Practice and Experience. DOI: 10.1002/spe.2812.

[5]. Yu, Z., Gao, C. Z., Jing, Z., Gupta, B. B., & Cai, Q. (2018). A practical public key encryption scheme based on learning parity with noise. IEEE Access, 6. https://doi.org/10.1109/access.2018.2840119.31918.

[6]. Sun, Y., Zhang, J., Xiong, Y. and Zhu, G. (2014) 'Data security and privacy in cloud computing', International Journal of Distributed Sensor Networks, 2014, available: http://dx.doi.org.ucd.idm.oclc.org/10.1155/2014/19090.

[7]. Almutairi, S., Alghanmi, N., & Monowar, M. M. (2021) Survey of Centralized and Decentralized Access Control Models in Cloud Computing. International Journal of Advanced Computer Science and Applications, 12(2). Available at: DOI:10.14569/IJACSA.2021.012024.

[8]. Westerlund, M., & Kratzke, N. (2018). Towards Distributed Clouds: A Review About the Evolution of Centralized Cloud Computing, Distributed Ledger Technologies, and A Foresight on Unifying Opportunities and Security Implications. 14.In 2018 International Conference on High Performance Computing & Simulation (HPCS) (pp.655-663). Orleans, France. doi:10.1109/HPCS.2018.00108.

[9]. Wang, D., Zhao, J., and Wang, Y. (2020). A Survey on Privacy Protection of Blockchain: The Technology and Application. IEEE Access, 8, pp.108766-108781. doi: 10.1109/ACCESS.2020.2994294. https://ieeexplore.ieee.org/abstract/document/9093015.

[10]. Steyerberg, E. W. (2018). Validation in prediction research: the waste by data splitting. Journal of Clinical Epidemiology, 103, pp.131–133. doi:10.1016/j.jclinepi.2018.07.01.

[11]. Song, J., Gu, T., & Mohapatra, P. (2021). How Blockchain Can Help Enhance The Security And Privacy in Edge Computing? arXiv:2111.00416 [cs.CR]. DOI: 10.48550/arXiv.2111.00416.

[12]. Deng, H., Qin, Z., Wu, Q., et al. (2020). Identity-based encryption transformation for flexible sharing of encrypted data in public cloud. IEEE Transactions on Information Forensics and Security, 15, pp.3168–3180. https://doi.org/10.1109/tifs.2020.298553.

[13]. Li, J., Zhang, Y., Ning, J., Huang, X., Sen Poh, G., & Wang, D. (2020). Attribute Based Encryption with Privacy protection and Accountability for CloudIoT. IEEE Transactions on Cloud Computing. https://doi.org/10.1109/TCC.2020.2975184.

[14]. Ullah, I., Amin, N. U., Khan, M. A., Khattak, H., & Kumari, S. (2021). An efficient and provably secure certificate-based combined signature, encryption and signcryption scheme for Internet of Things (IoT) in mobile health (M-health) system. Journal of Medical Systems, 45(1), pp.4–14. https://doi.org/10.1007/s10916-020-01658-.

[15]. Liu, S., Yu, J., Xiao, Y., Wan, Z., Wang, S., & Yan, B. (2020). BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT. IEEE Internet of Things Journal 7(9), 7851-7867.

Cite this article

Chen,Y. (2025). Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security. Applied and Computational Engineering,145,51-56.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 3rd International Conference on Software Engineering and Machine Learning

Conference website: https://2025.confseml.org/
ISBN:978-1-80590-024-5(Print) / 978-1-80590-023-8(Online)
Conference date: 2 July 2025
Editor:Marwan Omar
Series: Applied and Computational Engineering
Volume number: Vol.145
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).