2023
DOI: 10.11591/ijece.v13i2.pp1867-1879
|View full text |Cite
|
Sign up to set email alerts
|

Cloud data security and various cryptographic algorithms

Abstract: <p>Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 40 publications
(78 reference statements)
0
8
0
Order By: Relevance
“…Learning institutions must give priority to ensuring the security and confidentiality of the information entrusted to them, including personal information, grades, and student records. The installation and implementation of proper safeguards, secure communication protocols, access controls and user authentication, and regular monitoring and auditing of data access can help mitigate such security risks [13], [33], [34].…”
Section: Cybersecurity Concernsmentioning
confidence: 99%
“…Learning institutions must give priority to ensuring the security and confidentiality of the information entrusted to them, including personal information, grades, and student records. The installation and implementation of proper safeguards, secure communication protocols, access controls and user authentication, and regular monitoring and auditing of data access can help mitigate such security risks [13], [33], [34].…”
Section: Cybersecurity Concernsmentioning
confidence: 99%
“…Businesses can be confident that the agreed-upon terms will be implemented as planned, allowing them to make confident decisions. The transparency and traceability of blockchain also provide a high level of trust by allowing participants to verify the authenticity and transaction reliability, thereby reducing fraud risk or counterfeit products [42], [43]. With trust and security features, businesses can make well-informed decisions toward partnerships, customer engagement, and risk management, leading to improved outcomes and increased trust among stakeholders.…”
Section: Trust and Securitymentioning
confidence: 99%
“…Blockchain technology provides inherent security benefits, concerns regarding data privacy, and confidentiality persist [43], [48]. Future research should focus on developing privacy-enhancing technologies within blockchain-based platforms, such as zero-knowledge proofs and secure multiparty computation, to address these concerns.…”
Section: Privacy and Security Enhancementsmentioning
confidence: 99%
“…Enabling computational efficiency is equally important to ensuring safe communication since realtime applications impose fast and reliable processing. Technically, a cloud is a storage space for digitalized data spread across a number of servers that are overseen by cloud service providers (CSP) [9,10]. Cloud storage is widely utilized to allow for the storage of huge amounts of data known as big-data [11].…”
Section: Introductionmentioning
confidence: 99%