Systematic Review from Different Encryption Techniques Perspectives

alsadig abdallah, Amir Talib, Mandour Ibrahim, Elhadi AbdElgader

Abstract

The volume of Big Data produced from various sources is always growing. Such vast amounts of data cannot be stored using conventional techniques. As a result, the majority of businesses have switched to using cloud storage as a substitute for storing Big Data. Cloud storage has made great progress, but there are still several problems, such security worries. This article examines Big Data, its difficulties, and many security concerns from the perspectives of various encryption approaches. Additionally, it presents various views to address these issues and suggests a new classification of Big Data security difficulties

References

[1] S. Yin and O. Kaynak, "Big data for modern industry: challenges and trends [point of view]," Proceedings of the IEEE, vol. 103, pp. 143-146, 2015. http://dx.doi.org/10.1109/JPROC.2015.2388958
[2] K. Sarkar and P. P. Deb, "A Review on Trends of Cloud Computing for Autonomous Vehicle," AIJR Abstracts, p. 20, 2022.
[3] A. Manideep, C. N. V. Reddy, B. Srujana, and S. S. H. Raju, "Information Hiding Secretly Using Image Steganography," International Journal of Research in Engineering, Science and Management, vol. 6, pp. 17-20, 2023.
[4] J. B. Guinee, Handbook on life cycle assessment: operational guide to the ISO standards vol. 7: Springer Science & Business Media, 2002.
[5] P. Mell and T. Grance, "The NIST definition of cloud computing," 2011.
[6] F. Marozzo, "Infrastructures for High-Performance Computing: Cloud Infrastructures," 2019. http://dx.doi.org/10.1016/B978-0-12-809633-8.20374-9
[7] A. Huth and J. Cebula, "The basics of cloud computing," United States Computer, pp. 1-4, 2011.
[8] N. Khanezaei and Z. M. Hanapi, "A framework based on RSA and AES encryption algorithms for cloud computing services," in 2014 IEEE conference on systems, process and control (ICSPC 2014), 2014, pp. 588. http://dx.doi.org/10.1109/SPC.2014.708830
[9] A. Sachdev and M. Bhansali, "Enhancing cloud computing security using AES algorithm," International Journal of Computer Applications, vol. 67, 2013. http://dx.doi.org/10.5120/11422-6766
[10] F. Zhao, C. Li, and C. F. Liu, "A cloud computing security solution based on fully homomorphic encryption," in 16th international conference on advanced communication technology, 2014, pp. 485-488. http://dx.doi.org/10.1109/ICACT.2014.6779008
[11] R. Kaur and R. P. Singh, "Enhanced cloud computing security and integrity verification via novel encryption techniques," in 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014, pp. 1227-1233. http://dx.doi.org/10.1109/ICACCI.2014.6968328
[12] E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data security model for cloud computing," in 2012 8th International Conference on Informatics and Systems (INFOS), 2012, pp. CC-12-CC-17.
[13] A. K. Dubey, A. K. Dubey, M. Namdev, and S. S. Shrivastava, "Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment," in 2012 CSI Sixth International Conference on Software Engineering (CONSEG), 2012, pp. 1-8.
[14] Y. Li, K. Gai, L. Qiu, M. Qiu, and H. Zhao, "Intelligent cryptography approach for secure distributed big data storage in cloud computing," Information Sciences, vol. 387, pp. 103-115, 2017. http://dx.doi.org/10.1016/j.ins.2016.09.005
[15] K. V. Pradeep, V. Vijayakumar, and V. Subramaniyaswamy, "An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment," Journal of Computer Networks and Communications, vol. 2019, 2019.
[16] M. Kaur and R. Singh, "Implementing encryption algorithms to enhance data security of cloud in cloud computing," International Journal of Computer Applications, vol. 70, 2013. http://dx.doi.org/10.5120/12167-8127
[17] M. M. P. Mr, C. A. Dhote, and D. H. S. Mr, "Homomorphic encryption for security of cloud data," Procedia Computer Science, vol. 79, pp. 175-181, 2016.
[18] Z. Kartit, A. Azougaghe, H. Kamal Idrissi, M. El Marraki, M. Hedabou, M. Belkasmi, and A. Kartit, "Applying encryption algorithm for data security in cloud storage," in Advances in Ubiquitous Networking: Proceedings of the UNet’15 1, 2016, pp. 141-154.
http://dx.doi.org/10.1007/978-981-287-990-5_12
[19] D. S. AbdElminaam, "Improving the security of cloud computing by building new hybrid cryptography algorithms," International Journal of Electronics and Information Engineering, vol. 8, pp. 40-48, 2018.
[20] D. Das, "Secure cloud computing algorithm using homomorphic encryption and multi-party computation," in 2018 International Conference on Information Networking (ICOIN), 2018, pp. 391-396.
http://dx.doi.org/10.1109/ICOIN.2018.8343147
[21] D. Hyseni, A. Luma, B. Selimi, and B. Cico, "The proposed model to increase security of sensitive data in cloud computing," Int. J. Adv. Comput. Sci. Appl, vol. 9, pp. 203-210, 2018.
http://dx.doi.org/10.14569/IJACSA.2018.090229
[22] M. B. Qureshi, M. S. Qureshi, S. Tahir, A. Anwar, S. Hussain, M. Uddin, and C.-L. Chen, "Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud," Symmetry, vol. 14, p. 695, 2022.
http://dx.doi.org/10.3390/sym14040695
[23] S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in 2010 Proceedings IEEE INFOCOM, 2010, pp. 1-9.
http://dx.doi.org/10.1109/INFCOM.2010.5462174
[24] B. R. Purushothama and B. B. Amberker, "Efficient query processing on outsourced encrypted data in cloud with privacy preservation," in 2012 International Symposium on Cloud and Services Computing, 2012, pp. 88-95.
http://dx.doi.org/10.1109/ISCOS.2012.16
[25] M. Tebaa, S. d. El Hajji, and A. El Ghazi, "Homomorphic encryption method applied to Cloud Computing," in 2012 National Days of Network Security and Systems, 2012, pp. 86-89.
http://dx.doi.org/10.1109/JNS2.2012.6249248
[26] B. T. Rao, "A study on data storage security issues in cloud computing," Procedia Computer Science, vol. 92, pp. 128-135, 2016.
[27] G. Wang, Q. Liu, and J. Wu, "Achieving fine-grained access control for secure data sharing on cloud servers," Concurrency and Computation: Practice and Experience, vol. 23, pp. 1443-1464, 2011.
http://dx.doi.org/10.1002/cpe.1698

Authors

alsadig abdallah
sadigmo86@gmail.com (Primary Contact)
Amir Talib
Mandour Ibrahim
Elhadi AbdElgader
abdallah, alsadig, Talib, A. ., Ibrahim, M. ., & AbdElgader, E. . (2023). Systematic Review from Different Encryption Techniques Perspectives. International Journal of Advanced Science and Computer Applications, 3(1), 31–42. https://doi.org/10.47679/ijasca.v3i1.46

Article Details