2023
DOI: 10.1080/01969722.2023.2175117
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 71 publications
0
3
0
Order By: Relevance
“…Various studies and research efforts have been carried out to explore and enhance the performance and safety of cryptographic algorithms in cloud computing environments. Several studies have investigated security in cloud computing and Internet of Things (IoT) [1,[8][9][10][11][12]. In [13], a proposal was presented to improve the AES algorithm to better address emerging privacy threats in the cloud.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various studies and research efforts have been carried out to explore and enhance the performance and safety of cryptographic algorithms in cloud computing environments. Several studies have investigated security in cloud computing and Internet of Things (IoT) [1,[8][9][10][11][12]. In [13], a proposal was presented to improve the AES algorithm to better address emerging privacy threats in the cloud.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The authors 41,42 introduce a privacy-preserving Cloud-IoT architecture but note its added user load. Aboubakar et al 7 address security flaws in a multi-server cloud environment with a smartcard-based authentication scheme, relevant in a dispersed cloud context.…”
Section: Related Workmentioning
confidence: 99%
“…Cryptography is the practice of converting plain text into a coded message to protect it from unauthorized access or tampering. It plays a crucial role in securing communication channels and protecting sensitive information, such as financial transactions, personal information, and state secrets [3], [4]. Cryptography is widely used in various applications, including online banking, e-commerce, secure communication between individuals and organizations, and in the protection of critical infrastructure systems [5], [6].…”
Section: Introductionmentioning
confidence: 99%