A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing

(1) * Taufik Hidayat Mail (Universitas Wiralodra, Indonesia)
(2) Rahutomo Mahardiko Mail (Platinumetrix Pte. Ltd, Indonesia)
*corresponding author

Abstract


Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.


Keywords


cloud computing; encryption; data sharing; AES Algorithm; systematic literature review

   

DOI

https://doi.org/10.29099/ijair.v4i1.154
      

Article metrics

10.29099/ijair.v4i1.154 Abstract views : 5855 | PDF views : 975

   

Cite

   

Full Text

Download

References


B. S. Rawal, “Proxy re-encryption architect for storing and sharing of cloud contents,†International Journal of Parallel, Emergent and Distributed Systems, vol. 5760, pp. 1–17, Mar. 2018.

J. Gong, Y. Xu, and X. Zhao, “A Privacy-preserving Image Retrieval Method Based on Improved BoVW Model in Cloud Environment,†IETE Technical Review, vol. 35, no. sup1, pp. 76–84, Dec. 2018.

M. Joshi, K. Joshi, and T. Finin, “Attribute Based Encryption for Secure Access to Cloud Based EHR Systems,†in 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2018, vol. 2018–July, pp. 932–935.

D. Pei, X. Guo, and J. Zhang, “A video encryption service based on cloud computing,†in 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), 2017, pp. 167–171.

L. Tawalbeh, N. S. Darwazeh, R. S. Al-Qassas, and F. AlDosari, “A secure cloud computing model based on data classification,†Procedia Computer Science, vol. 52, no. 1, pp. 1153–1158, 2015.

A. Bhardwaj, G. V. B. Subrahmanyam, V. Avasthi, and H. Sastry, “Security Algorithms for Cloud Computing,†Procedia Computer Science, vol. 85, no. Cms, pp. 535–542, 2016.

A. Bentajer, M. Hedabou, K. Abouelmehdi, Z. Igarramen, and S. El Fezazi, “An IBE-based design for assured deletion in cloud storage,†Cryptologia, vol. 43, no. 3, pp. 254–265, 2019.

K. M. Akhil, M. P. Kumar, and B. R. Pushpa, “Enhanced cloud data security using AES algorithm,†in 2017 International Conference on Intelligent Computing and Control (I2C2), 2017, vol. 2018–Janua, pp. 1–5.

N. Surv, B. Wanve, R. Kamble, S. Patil, and J. Katti, “Framework for client side AES encryption technique in cloud computing,†Souvenir of the 2015 IEEE International Advance Computing Conference, IACC 2015, pp. 525–528, 2015.

S. Amamou, Z. Trifa, and M. Khmakhem, “Data protection in cloud computing: A Survey of the State-of-Art,†Procedia Computer Science, vol. 159, pp. 155–161, 2019.

M. D. Boomija, “Secure data sharing through additive similarity based ElGamal like encryption,†in 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), 2016, pp. 652–655.

N. Sehgal, Y. Xiong, W. Mulia, S. Sohoni, D. Fritz, and J. Acken, “A Cross Section of the Issues and Research Activities Related to Both Information Security and Cloud Computing,†IETE Technical Review, vol. 28, no. 4, p. 279, 2011.

B. Cui, Z. Liu, and L. Wang, “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage,†IEEE Transactions on Computers, vol. 65, no. 8, pp. 2374–2385, Aug. 2016.

Salma, R. F. Olanrewaju, K. Abdullah, Rusmala, and H. Darwis, “Enhancing Cloud Data Security Using Hybrid of Advanced Encryption Standard and Blowfish Encryption Algorithms,†in 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT), 2018, pp. 18–23.

M. B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, and Y. Khamayseh, “Comprehensive study of symmetric key and asymmetric key encryption algorithms,†in 2017 International Conference on Engineering and Technology (ICET), 2017, vol. 2018–Janua, pp. 1–7.

C. Sur, Y. Park, and K. H. Rhee, “An efficient and secure navigation protocol based on vehicular cloud,†International Journal of Computer Mathematics, vol. 93, no. 2, pp. 325–344, Feb. 2016.

Y. Yuan, Y. Yang, L. Wu, and X. Zhang, “A High Performance Encryption System Based on AES Algorithm with Novel Hardware Implementation,†in 2018 IEEE International Conference on Electron Devices and Solid State Circuits (EDSSC), 2018, pp. 1–2.

S. A. Pitchay, W. A. A. Alhiagem, F. Ridzuan, and M. M. Saudi, “A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing,†in 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim), 2015, pp. 201–205.

A. S. Babrahem and M. M. Monowar, “Preserving confidentiality and privacy of the patient’s EHR using the OrBAC and AES in cloud environment,†International Journal of Computers and Applications, vol. 7074, 2018.

P. Sivakumar, M. NandhaKumar, R. Jayaraj, and A. S. Kumaran, “Securing Data and Reducing the Time Traffic Using AES Encryption with Dual Cloud,†in 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), 2019, pp. 1–5.

S. Alonso-Monsalve, F. García-Carballeira, and A. Calderón, “A heterogeneous mobile cloud computing model for hybrid clouds,†Future Generation Computer Systems, vol. 87, pp. 651–666, 2018.

J. Domingo-Ferrer, O. Farrà s, J. Ribes-González, and D. Sánchez, “Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges,†Computer Communications, vol. 140–141, no. December 2018, pp. 38–60, May 2019.

R. Kumar and R. Goyal, “On cloud security requirements, threats, vulnerabilities and countermeasures: A survey,†Computer Science Review, vol. 33, pp. 1–48, 2019.

N. Mohammed and N. Ibrahim, “Implementation of new secure encryption technique for cloud computing,†ICCISTA 2019 - IEEE International Conference on Computing and Information Science and Technology and their Applications 2019, pp. 1–5, 2019.

S. Ojha and V. Rajput, “AES and MD5 based secure authentication in cloud computing,†Proceedings of the International Conference on IoT in Social, Mobile, Analytics and Cloud, I-SMAC 2017, pp. 856–860, 2017.

N. Shimbre and P. Deshpande, “Enhancing distributed data storage security for cloud computing using TPA and AES algorithm,†Proceedings - 1st International Conference on Computing, Communication, Control and Automation, ICCUBEA 2015, pp. 35–39, 2015.

Fitroh and D. N. Utama, “Synthesizing a soft system methodology use in information systems research field: A systematic review,†2017 5th International Conference on Information and Communication Technology, ICoIC7 2017, vol. 0, no. c, pp. 1–4, 2017.

C. Soledad, “Methodology for Systematic Literature Review applied to Engineering and Education,†2018 IEEE Global Engineering Education Conference (EDUCON), pp. 1370–1379, 2018.

P. Sharma and J. Singh, “Systematic Literature Review on Software Effort Estimation Using Machine Learning Approaches,†in 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), 2017, pp. 43–47.

T. Hidayat, Y. Azzery, and R. Mahardiko, “Load Balancing Network by using Round Robin Algorithm: A Systematic Literature Review,†Jurnal Online Informatika, vol. 4, no. 2, pp. 85–89, 2019.

N. A. Salleh, H. Hussin, M. A. Suhaimi, and A. Md Ali, “A systematic literature review of cloud computing adoption and impacts among small medium enterprises (SMEs),†Proceedings - International Conference on Information and Communication Technology for the Muslim World 2018, ICT4M 2018, pp. 278–284, 2018.

P. Rosati, G. Fox, D. Kenny, and T. Lynn, “Quantifying the Financial Value of Cloud Investments: A Systematic Literature Review,†Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, vol. 2017–Decem, pp. 194–201, 2017.

K.-L. Tsai, F.-Y. Leu, and S.-H. Tsai, “Data Encryption Method Using Environmental Secret Key with Server Assistance,†Intelligent Automation & Soft Computing, vol. 22, no. 3, pp. 423–430, Jul. 2016.

M. I. S. Reddy and A. P. S. Kumar, “Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm,†Procedia Computer Science, vol. 85, no. Cms, pp. 62–69, 2016.

J. C. S. do. Anjos et al., “Fast-Sec: an approach to secure Big Data processing in the cloud,†International Journal of Parallel, Emergent and Distributed Systems, vol. 34, no. 3, pp. 272–287, 2019.

Q. Wu, B. Qin, L. Zhang, J. Domingo-Ferrer, O. Farras, and J. A. Manjon, “Contributory broadcast encryption with efficient encryption and short ciphertexts,†IEEE Transactions on Computers, vol. 65, no. 2, pp. 466–479, 2016.

L. Yu, D. Zhang, L. Wu, S. Xie, D. Su, and X. Wang, “AES Design Improvements Towards Information Security Considering Scan Attack,†Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 322–326, 2018.

V. Dilna and C. Babu, “Area optimized and high throughput AES algorithm based on permutation data scramble approach,†International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016, pp. 3056–3060, 2016.

W. Al Etaiwi and S. Hraiz, “Structured encryption algorithm for text cryptography,†Journal of Discrete Mathematical Sciences and Cryptography, vol. 21, no. 7–8, pp. 1559–1572, 2018.

B.-H. Lee, E. K. Dewi, and M. F. Wajdi, “Data security in cloud computing using AES under HEROKU cloud,†in 2018 27th Wireless and Optical Communication Conference (WOCC), 2018, pp. 1–5.

N. Agarwal, A. Rana, and J. P. Pandey, “Guarded dual authentication based DRM with resurgence dynamic encryption techniques,†Enterprise Information Systems, vol. 13, no. 3, pp. 257–280, 2019.

J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, and Y. Xiang, “Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing,†IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 6, pp. 996–1010, Nov. 2019.

M. Hossain, R. Khan, S. Al Noor, and R. Hasan, “Jugo: A generic architecture for composite cloud as a service,†IEEE International Conference on Cloud Computing, CLOUD, pp. 806–809, 2017.

M. Morales-Sandoval, A. K. Vega-Castillo, and A. Diaz-Perez, “A Secure Scheme for Storage, Retrieval, and Sharing of Digital Documents in Cloud Computing Using Attribute-Based Encryption on Mobile Devices,†Information Security Journal: A Global Perspective, vol. 23, no. 1–2, pp. 22–31, Jan. 2014.

M. Bahrami and M. Singhal, “A light-weight permutation based method for data privacy in mobile cloud computing,†Proceedings - 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2015, pp. 189–196, 2015.

R. Dowsley, A. Michalas, M. Nagel, and N. Paladi, “A survey on design and implementation of protected searchable data in the cloud,†Computer Science Review, vol. 26, pp. 17–30, Nov. 2017.

P. Kumar and S. B. Rana, “Development of modified AES algorithm for data security,†Optik, vol. 127, no. 4, pp. 2341–2345, Feb. 2016.

Ritambhara, A. Gupta, and M. Jaiswal, “An enhanced AES algorithm using cascading method on 400 bits key size used in enhancing the safety of next generation internet of things (IOT),†in 2017 International Conference on Computing, Communication and Automation (ICCCA), 2017, pp. 422–427.

S. Madhavapandian and P. MaruthuPandi, “FPGA implementation of highly scalable AES algorithm using modified mix column with gate replacement technique for security application in TCP/IP,†Microprocessors and Microsystems, vol. 73, p. 102972, 2020.

Y. Liu, W. Gong, and W. Fan, “Application of AES and RSA Hybrid Algorithm in E-mail,†in 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS), 2018, pp. 701–703.




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

________________________________________________________

The International Journal of Artificial Intelligence Research

Organized by: Departemen Teknik Informatika
Published by: STMIK Dharma Wacana
Jl. Kenanga No.03 Mulyojati 16C Metro Barat Kota Metro Lampung

Email: jurnal.ijair@gmail.com

View IJAIR Statcounter

Creative Commons License
This work is licensed under  Creative Commons Attribution-ShareAlike 4.0 International License.