A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

[PDF][PDF] Cloud data security and various cryptographic algorithms

Y Alemami, AM Al-Ghonmein… - … Journal of Electrical …, 2023 - researchgate.net
Cloud computing has spread widely among different organizations due to its advantages,
such as cost reduction, resource pooling, broad network access, and ease of administration …

A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

P Singh, AK Pandey - International Journal of Data Informatics and …, 2022 - ijdiic.com
Cloud computing (CC) is among the most rapidly evolving computer technologies. That is
the required accessibility of network assets, mainly information storage with processing …

MapSafe: A complete tool for achieving geospatial data sovereignty

P Sharma, M Martin, D Swanlund - Transactions in GIS, 2023 - Wiley Online Library
Sensitive geographic data are invaluable assets for the people to whom they belong and
their disclosure should be decided by the sovereign data owner (SDO). Due to several high …

An improved RSA technique with efficient data integrity verification for outsourcing database in cloud

KL Neela, V Kavitha - Wireless Personal Communications, 2022 - Springer
Abstract The Cloud Environment provides storage for files as well as sharing services for
disseminated clients. This technology helps users in the cloud to outsource their data and …

Security Concerns in Digital Transformation of Electronic Land Registration: Legal Protection in Cybersecurity Laws in Indonesia

E Syarief - International Journal of Cyber Criminology, 2022 - cybercrimejournal.com
Several cybercriminals and hackers are currently attempting to obtain an immovable
property using fraudulent land papers in the digital realm. However, electronic land …

A cloud‐based solution for trustless indigenous data sovereignty: Protecting Māori biodiversity management data in Aotearoa New Zealand

P Sharma, M Martin, D Swanlund, C Latham… - Transactions in …, 2024 - Wiley Online Library
Indigenous peoples should be able to govern data about themselves, their territories,
resources, and ways of life, collected by themselves or others. However, the progressive use …

Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment

AS Ismail, D Pradeep, J Ashok - KSII Transactions on Internet and …, 2023 - koreascience.kr
All aspects of human life have become increasingly dependent on data in the last few
decades. The development of several applications causes an enormous issue on data …

Data security in cloud environment using cryptographic mechanism

AA Fairosebanu, ACN Jebaseeli - Bulletin of Electrical Engineering and …, 2023 - beei.org
Virtual computing resources are provided via a cloud system that is both clever and
intelligent. Based on the user's request, computing resources are made available. A hybrid …

A lightweight block encryption algorithm for narrowband internet of things

G Zhao, H Chen, J Wang - Peer-to-Peer Networking and Applications, 2023 - Springer
With the increasingly prominent problem of data security in Narrowband Internet of Things
(NB-IoT) terminal transmission, the existing cryptographic algorithms still have problems that …