A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing
TLDR
An encryption-based proposed system is presented to secure system security during data transfer in order to prevent data theft by unauthorized person and Systematic Literature Review is proposed to generate suggestions and opportunities in AES cloud computing.Abstract:
Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.read more
Citations
More filters
Journal ArticleDOI
COVID-19: Digital Signature Impact On Higher Education Motivation Performance
TL;DR: The final result of this study is that the digital signature system has a significant impact on increasing motivation to facilitate authorization and secure documents.
Proceedings ArticleDOI
Forecast Analysis of Research Chance on AES Algorithm to Encrypt during Data Transmission on Cloud Computing
TL;DR: The proposed system, Advanced Encryption Standard (AES) algorithm, will anticipate every irresponsible person to hack cloud system and will encrypt and decrypt information on data transmission and storage.
Journal ArticleDOI
Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism
TL;DR: An AI-based intelligent feature learning mechanism named Probabilistic Super Learning- (PSL-) Random Hashing (RH) for improving the security of healthcare data stored in IoT-cloud and reducing the cost of IoT sensors by implementing the proposed learning model.
Journal ArticleDOI
Advanced Encryption Standard based Secure IoT Data Transfer Model for Cloud Analytics Applications
TL;DR: An end-to-end data encryption model based on advanced encryption standard and Intel SGX are used to design the framework of the data privacy preservation model to protect rule-based programs and sensitive IoT information against cyberattacks.
Journal ArticleDOI
Secure data sharing for mobile cloud computing using RSA
TL;DR: This paper focuses mainly on the safe re-appropriation of photographs and its applications in cloud computing, where the secrecy of photos and information is generally important.
References
More filters
Journal ArticleDOI
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
TL;DR: This paper presents a novel block design-based key agreement protocol that supports multiple participants, which can flexibly extend the number of participants in a cloud environment according to the structure of the block design.
Journal ArticleDOI
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
Rakesh Kumar,Rinkaj Goyal +1 more
TL;DR: This study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping and highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things, Software Defined Network (SDN) and Network Function Virtualization (NFV).
Journal ArticleDOI
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
TL;DR: This paper proposes the novel concept of key-aggregate searchable encryption and instantiates the concept through a concrete KASE scheme, in which a data owner only needs to distribute a single key to a user for sharing a large number of documents, and the user only need to submit a single trapdoor to the cloud for querying the shared documents.
Journal ArticleDOI
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
TL;DR: This survey covers technologies that allow privacy-aware outsourcing of storage and processing of sensitive data to public clouds and reviews masking methods for outsourced data based on data splitting and anonymization, in addition to cryptographic methods covered in other surveys.
Proceedings ArticleDOI
Methodology for systematic literature review applied to engineering and education
TL;DR: This work proposes an adaptation of the method by Kitchenham and Bacca, which divides the process into three sub-parts: planning, conducting and reporting results, and follows with rigor the definition of general and specific inclusion and exclusion criteria.