Qureshi, Muhammad Bilal, Qureshi, Muhammad Shuaib, Tahir, Saqib, Anwar, Aamir and Chen, Chin-Ling (2022) Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry, 14 (4). p. 695.
Preview |
PDF
symmetry-14-00695_Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud.pdf - Published Version Available under License Creative Commons Attribution. Download (5MB) | Preview |
Abstract
With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users on the pay-per-use policy. It allows small businesses to use top-notch infrastructure at low expense. However, due to the cloud resource sharing property, data privacy and security are significant concerns and barriers for smart systems to constantly transfer generated data to the cloud computing resources, which a third-party provider manages. Many encryption techniques have been proposed to cope with data security issues. In this paper, different existing data protection and encryption techniques based on common parameters have been critically analyzed and their workflows are graphically presented. This survey aims to collect existing data encryption techniques widely presented in the literature for smart system data security offloaded to the cloud computing systems under a single umbrella.
Item Type: | Article |
---|---|
Identifier: | 10.3390/sym14040695 |
Subjects: | Computing > Information security > Cyber security |
Depositing User: | Marc Forster |
Date Deposited: | 11 Nov 2024 09:03 |
Last Modified: | 11 Nov 2024 09:15 |
URI: | https://repository.uwl.ac.uk/id/eprint/12873 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |