A Systematic literature review method on aes algorithm for data sharing encryption on cloud computing

T Hidayat, R Mahardiko - International Journal of Artificial Intelligence …, 2020 - ijair.id
Cloud computing is one revolution in information technology (IT) that can share resources,
services and data through a network among users. Because users have same rights on the …

Security algorithms for cloud computing

A Bhardwaj, GVB Subrahmanyam, V Avasthi… - Procedia Computer …, 2016 - Elsevier
With growing awareness and concerns regards to Cloud Computing and Information
Security, there is growing awareness and usage of Security Algorithms into data systems …

A review: cryptography and steganography algorithm for cloud computing

S Singla, A Bala - 2018 Second International Conference on …, 2018 - ieeexplore.ieee.org
The cloud computing grid plays a vital role in the Internet Of Things (IOT) and 5G
technologies. It provides a platform through huge data information is communicated …

[PDF][PDF] Symmetric encryption algorithm to secure outsourced data in public cloud storage

R Sugumar, SBS Imam - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: Cloud storage is an increasingly popular class of services
for archiving, backup and sharing of data. Data security concern has been one of the major …

Authorized update in multi-user homomorphic encrypted cloud database

T Parbat, A Chatterjee - IEEE Transactions on Knowledge and …, 2022 - ieeexplore.ieee.org
Cloud Computing is a promising solution in distributed internet computing for IT and
scientific research. However, data storage and computing in the cloud domain raise added …

A survey on data confidentiality and privacy in cloud computing

A Aloraini, M Hammoudeh - … of the international conference on future …, 2017 - dl.acm.org
Cloud computing is often referred to as the technology of the decade. Current Cloud systems
present critical limitations to protecting users' data confidentiality. This survey presents a …

A two-tier security solution for storing data across public cloud

K Sharma, F Rafiqui, P Attri… - Recent Patents on …, 2019 - ingentaconnect.com
Background: Data integrity protection in Cloud Computing becomes very challenging since
the user no longer has the possession of their own data. This makes cloud data storage …

A novel trusted third party based signcryption scheme

S Ullah, XY Li, Z Lan - Multimedia Tools and Applications, 2020 - Springer
To prevent man-in-the-middle attack, Diffie-Hellman first proposed the concept of the
session key exchange protocol, in which the author remove the long term keying material at …

Implementing location-based cryptography on mobile application design to secure data in cloud storage

NSM Shamsuddin, SA Pitchay - Journal of Physics: Conference …, 2020 - iopscience.iop.org
This paper aims to identify security issues and existing solutions for cloud storage protection
and to propose a mobile application design for securing data in cloud storage using the …

A variable length key based cryptographic approach on cloud data

P Ghosh, MZ Hasan, ST Atik… - 2019 International …, 2019 - ieeexplore.ieee.org
Security has emerged to be a concerning issue in cloud computing as numerous sensitive
data are processed and transferred over the cloud servers. In this paper, a variable length …