Reconnoitering Security Algorithms Performance in the Cloud: Systematic Literature Review based on the Prisma Archetype

dc.contributor.authorDawson, John Kwao
dc.contributor.authorTwum, Frimpong
dc.contributor.authorHayfron-Acquah, James Benjamin
dc.contributor.authorMissah, Yaw Marfo
dc.contributor.orcid0000-0002-7436-5550
dc.contributor.orcid0000-0002-1869-7542
dc.contributor.orcid0000-0001-6935-9431
dc.contributor.orcid0000-0002-2926-681X
dc.date.accessioned2023-12-06T13:50:38Z
dc.date.available2023-12-06T13:50:38Z
dc.date.issued2023-03-31
dc.descriptionAn article published in Journal of Theoretical and Applied Information Technology ,31st March 2023. Vol.101. No 6
dc.description.abstractIndustries and academia have embraced cloud computing for their day-to-day activities. A lot of studies have been done to unpin variants of cryptographic algorithms used to secure the cloud. This survey aims to unravel recent studies of the most employed cryptographic scheme used to secure the cloud, the type of cryptographic algorithms used, the execution time trend of the cryptographic algorithms (Linear time / Non-Linear time), the aims of these cryptographic algorithms, and identify some of the security concerns in cloud computing. The study considered published studies from 2015 to 2022 from well-known databases such as Taylor and Francis, Scopus, Research Gate, Web of Science, IEEE Xplore, Science Direct, Hindawi, Google Scholar, and ACM. A total of 72 published articles were considered to respond to the various specific objectives using the Prisma framework. The systematic literature review has revealed the usage of encryption schemes as the most employed cryptographic approach and data security and cloud security as the most researched security challenge. The security challenges that were identified are data integrity and preservation, intrusion detection, and privacy and confidentiality. It has been revealed that from 2015 to 2022, 90% of encryption algorithms depict linear time complexity. The systematic literature review has proven little usage of symmetric stream cipher algorithms to ensure the privacy and confidentiality of cloud data.
dc.description.sponsorshipKNUST
dc.identifier.citationJournal of Theoretical and Applied Information Technology 31st March 2023. Vol.101. No 6
dc.identifier.issn1992-8645
dc.identifier.urihttps://ir.knust.edu.gh/handle/123456789/14667
dc.language.isoen
dc.publisherJournal of Theoretical and Applied Information Technology
dc.titleReconnoitering Security Algorithms Performance in the Cloud: Systematic Literature Review based on the Prisma Archetype
dc.typeArticle
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
14Vol101No6.pdf
Size:
1.62 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description:
Collections