Reconnoitering Security Algorithms Performance in the Cloud: Systematic Literature Review based on the Prisma Archetype
dc.contributor.author | Dawson, John Kwao | |
dc.contributor.author | Twum, Frimpong | |
dc.contributor.author | Hayfron-Acquah, James Benjamin | |
dc.contributor.author | Missah, Yaw Marfo | |
dc.contributor.orcid | 0000-0002-7436-5550 | |
dc.contributor.orcid | 0000-0002-1869-7542 | |
dc.contributor.orcid | 0000-0001-6935-9431 | |
dc.contributor.orcid | 0000-0002-2926-681X | |
dc.date.accessioned | 2023-12-06T13:50:38Z | |
dc.date.available | 2023-12-06T13:50:38Z | |
dc.date.issued | 2023-03-31 | |
dc.description | An article published in Journal of Theoretical and Applied Information Technology ,31st March 2023. Vol.101. No 6 | |
dc.description.abstract | Industries and academia have embraced cloud computing for their day-to-day activities. A lot of studies have been done to unpin variants of cryptographic algorithms used to secure the cloud. This survey aims to unravel recent studies of the most employed cryptographic scheme used to secure the cloud, the type of cryptographic algorithms used, the execution time trend of the cryptographic algorithms (Linear time / Non-Linear time), the aims of these cryptographic algorithms, and identify some of the security concerns in cloud computing. The study considered published studies from 2015 to 2022 from well-known databases such as Taylor and Francis, Scopus, Research Gate, Web of Science, IEEE Xplore, Science Direct, Hindawi, Google Scholar, and ACM. A total of 72 published articles were considered to respond to the various specific objectives using the Prisma framework. The systematic literature review has revealed the usage of encryption schemes as the most employed cryptographic approach and data security and cloud security as the most researched security challenge. The security challenges that were identified are data integrity and preservation, intrusion detection, and privacy and confidentiality. It has been revealed that from 2015 to 2022, 90% of encryption algorithms depict linear time complexity. The systematic literature review has proven little usage of symmetric stream cipher algorithms to ensure the privacy and confidentiality of cloud data. | |
dc.description.sponsorship | KNUST | |
dc.identifier.citation | Journal of Theoretical and Applied Information Technology 31st March 2023. Vol.101. No 6 | |
dc.identifier.issn | 1992-8645 | |
dc.identifier.uri | https://ir.knust.edu.gh/handle/123456789/14667 | |
dc.language.iso | en | |
dc.publisher | Journal of Theoretical and Applied Information Technology | |
dc.title | Reconnoitering Security Algorithms Performance in the Cloud: Systematic Literature Review based on the Prisma Archetype | |
dc.type | Article |