A Systematic literature review method on aes algorithm for data sharing encryption on cloud computing

T Hidayat, R Mahardiko - International Journal of Artificial Intelligence …, 2020 - ijair.id
Cloud computing is one revolution in information technology (IT) that can share resources,
services and data through a network among users. Because users have same rights on the …

Encryption Security Sharing Data Cloud Computing by Using AES Algorithm: A Systematic Review

T Hidayat - TEKNOKOM, 2019 - teknokom.unwir.ac.id
Teknologi cloud computing merupakan revolusi yang dapat berbagi sumber daya, layanan
dan data di antara pengguna melalui jaringan. Karena jutaan pengguna menggunakan hak …

Performance analysis of PostgreSQL, MySQL, microsoft SQL server systems based on TPC-H tests

IS Vershinin, AR Mustafina - 2021 International Russian …, 2021 - ieeexplore.ieee.org
The development of information technologies requires the processing of an increasing
amount of information. A great number of tools and DBMSs for working with big data have …

Multi-cloud provisioning of business processes

K Kritikos, C Zeginis, J Iranzo, RS Gonzalez… - Journal of Cloud …, 2019 - Springer
The Cloud offers enhanced flexibility in the management of resources for any kind of
application while it promises the reduction of its cost as well as its infinite scalability. In this …

Smart delivery of multifaceted services through connected governance

A Roy - 2019 3rd International Conference on Computing …, 2019 - ieeexplore.ieee.org
Advancement of Information and Communication Technology have enabled delivery of
electronic communication services to the doorstep of Citizen. To deliver these …

Cloudity: Cloud supply chain framework design based on jugo and blockchain

R Asyrofi, N Zulfa - 2020 6th Information Technology …, 2020 - ieeexplore.ieee.org
Supply chain management (SCM) system is a main requirement for manufacturers and
companies to cooperate. There are many management techniques to manage supply …

Synergy in Action: Harnessing Cloud Services and Wired Broadband for Seamless Operations

P Ashok, G Hallur - … 2nd World Conference on Communication & …, 2024 - ieeexplore.ieee.org
Cloud services and apps transform IT infrastructure by providing scalable, on-demand
resources online. They offer flexible, cost-effective storage, computation, and software …

Securing Cloud Data: A hybrid encryption approach with RSA and AES for enhanced security and performance

RS Durge, VM Deshmukh - Journal of Integrated Science and …, 2025 - pubs.thesciencein.org
In cloud computing, where open environments are used to store data and distribute
resources, security has become the primary barrier to develo** cloud environments …

A Revocable Certificateless Sanitizable Signature Scheme with Batch Verification

HY Lin, TT Tsai, HL Wu - IEEE Access, 2024 - ieeexplore.ieee.org
In medical and healthcare application scenarios, data integrity and user privacy are often
concerned the most. A sanitizable signature scheme is a common adopted approach since it …

A novel scheme for large-size data block transmission in vehicular ad hoc networks: Architecture, challenges and discussions

X Yin, J Liu, B Zeng, W He, X **ong, H Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
Limited by the bandwidth of IEEE 802.11 p protocol, a large-size data block commonly
cannot be transmitted within one communication link in a vehicular ad hoc network (VANET) …