PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud

Author:

Kwao Dawson John1ORCID,Twum Frimpong2,Hayfron Acquah James Benjamin2,Missah Yaw Marfo2

Affiliation:

1. Sunyani Technical University, Department of Computer Science, Sunyani, Ghana

2. Kwame Nkrumah University of Science and Technology, Department of Computer Science, Kumasi, Ghana

Abstract

Industries have embraced cloud computing for their daily operations due to the volume of data they create. As data generation and consumption have increased, the challenges and opportunities have also increased. Researchers have proposed various cryptographic schemes to secure data on the cloud. Regardless of the multiple cryptographic schemes proposed, security remains an obstacle to cloud computing’s widespread adoption. Also, these cryptographic schemes’ run times are proportional to data sizes, motivating excessive CPU engagement during execution of huge data, which has consequences for the need for high bandwidth to transfer data to the cloud. This systematic review tries to uncover the most often used cryptographic schemes and their run time trends to attain confidentiality and privacy of cloud data. The study considered published articles from well-known databases such as Taylor & Francis, Scopus, Research Gate, Web of Science, IEEE Xplore, Science Direct, Hindawi, Google Scholar, Sage, Emerald, Wiley Online Library, and ACM from 2016 to 2022. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were used to select 73 published works for this study using keyword searching. Data security and cloud security were the security challenges that received the greatest attention in the study with encryption techniques as the most common solution. From the study, 90% of the schemes used to secure data on the cloud produced linear run times. The investigation discovered that nonlinear symmetric stream cipher methods were infrequently employed to protect the secrecy and privacy of cloud data.

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3