Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud.

Qureshi, Muhammad Bilal, Qureshi, Muhammad Shuaib, Tahir, Saqib, Anwar, Aamir and Chen, Chin-Ling (2022) Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry, 14 (4). p. 695.

[thumbnail of symmetry-14-00695_Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud.pdf]
Preview
PDF
symmetry-14-00695_Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud.pdf - Published Version
Available under License Creative Commons Attribution.

Download (5MB) | Preview

Abstract

With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users on the pay-per-use policy. It allows small businesses to use top-notch infrastructure at low expense. However, due to the cloud resource sharing property, data privacy and security are significant concerns and barriers for smart systems to constantly transfer generated data to the cloud computing resources, which a third-party provider manages. Many encryption techniques have been proposed to cope with data security issues. In this paper, different existing data protection and encryption techniques based on common parameters have been critically analyzed and their workflows are graphically presented. This survey aims to collect existing data encryption techniques widely presented in the literature for smart system data security offloaded to the cloud computing systems under a single umbrella.

Item Type: Article
Identifier: 10.3390/sym14040695
Subjects: Computing > Information security > Cyber security
Depositing User: Marc Forster
Date Deposited: 11 Nov 2024 09:03
Last Modified: 11 Nov 2024 09:15
URI: https://repository.uwl.ac.uk/id/eprint/12873

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu