scispace - formally typeset
Open AccessJournal ArticleDOI

A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing

Taufik Hidayat, +1 more
- 09 Apr 2020 - 
- Vol. 4, Iss: 1, pp 49-57
TLDR
An encryption-based proposed system is presented to secure system security during data transfer in order to prevent data theft by unauthorized person and Systematic Literature Review is proposed to generate suggestions and opportunities in AES cloud computing.
Abstract
Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

COVID-19: Digital Signature Impact On Higher Education Motivation Performance

TL;DR: The final result of this study is that the digital signature system has a significant impact on increasing motivation to facilitate authorization and secure documents.
Proceedings ArticleDOI

Forecast Analysis of Research Chance on AES Algorithm to Encrypt during Data Transmission on Cloud Computing

TL;DR: The proposed system, Advanced Encryption Standard (AES) algorithm, will anticipate every irresponsible person to hack cloud system and will encrypt and decrypt information on data transmission and storage.
Journal ArticleDOI

Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism

TL;DR: An AI-based intelligent feature learning mechanism named Probabilistic Super Learning- (PSL-) Random Hashing (RH) for improving the security of healthcare data stored in IoT-cloud and reducing the cost of IoT sensors by implementing the proposed learning model.
Journal ArticleDOI

Advanced Encryption Standard based Secure IoT Data Transfer Model for Cloud Analytics Applications

TL;DR: An end-to-end data encryption model based on advanced encryption standard and Intel SGX are used to design the framework of the data privacy preservation model to protect rule-based programs and sensitive IoT information against cyberattacks.
Journal ArticleDOI

Secure data sharing for mobile cloud computing using RSA

TL;DR: This paper focuses mainly on the safe re-appropriation of photographs and its applications in cloud computing, where the secrecy of photos and information is generally important.
References
More filters
Journal ArticleDOI

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing

TL;DR: This paper presents a novel block design-based key agreement protocol that supports multiple participants, which can flexibly extend the number of participants in a cloud environment according to the structure of the block design.
Journal ArticleDOI

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

TL;DR: This study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping and highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things, Software Defined Network (SDN) and Network Function Virtualization (NFV).
Journal ArticleDOI

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

TL;DR: This paper proposes the novel concept of key-aggregate searchable encryption and instantiates the concept through a concrete KASE scheme, in which a data owner only needs to distribute a single key to a user for sharing a large number of documents, and the user only need to submit a single trapdoor to the cloud for querying the shared documents.
Journal ArticleDOI

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

TL;DR: This survey covers technologies that allow privacy-aware outsourcing of storage and processing of sensitive data to public clouds and reviews masking methods for outsourced data based on data splitting and anonymization, in addition to cryptographic methods covered in other surveys.
Proceedings ArticleDOI

Methodology for systematic literature review applied to engineering and education

TL;DR: This work proposes an adaptation of the method by Kitchenham and Bacca, which divides the process into three sub-parts: planning, conducting and reporting results, and follows with rigor the definition of general and specific inclusion and exclusion criteria.