The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2023
DOI: 10.1371/journal.pone.0290831
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend

John Kwao Dawson,
Twum Frimpong,
James Benjamin Hayfron Acquah
et al.

Abstract: The cloud is becoming a hub for sensitive data as technology develops, making it increasingly vulnerable, especially as more people get access. Data should be protected and secured since a larger number of individuals utilize the cloud for a variety of purposes. Confidentiality and privacy of data is attained through the use of cryptographic techniques. While each cryptographic method completes the same objective, they all employ different amounts of CPU, memory, throughput, encryption, and decryption times. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…This again defeats the notion that Chacha20 uses less memory during execution [ 45 ]. From the experimental results, SK 4 OA could be considered as a lightweight algorithm that could be better employed in the cloud to attain high security as it uses less loops and has lower run times [ 46 ]. Also, SK4OA could be used in environment, where less memory is needed such as ubiquitous computing.…”
Section: Discussionmentioning
confidence: 99%
“…This again defeats the notion that Chacha20 uses less memory during execution [ 45 ]. From the experimental results, SK 4 OA could be considered as a lightweight algorithm that could be better employed in the cloud to attain high security as it uses less loops and has lower run times [ 46 ]. Also, SK4OA could be used in environment, where less memory is needed such as ubiquitous computing.…”
Section: Discussionmentioning
confidence: 99%
“…A key component of research ethics is protecting participants' anonymity and confidentiality since people are more willing to divulge sensitive and private information when given that assurance [13]. The researcher must ensure the confidentiality of participant data to avoid any possible injury or discomfort resulting from its exposure.…”
Section: Privacy and Confidentialitymentioning
confidence: 99%
“…Maintaining ethical standards requires protecting the participants' anonymity and privacy [13]. The research will closely follow data protection standards to guarantee that all information is kept private and used only for the study.…”
Section: Privacy and Confidentialitymentioning
confidence: 99%