{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:45:20Z","timestamp":1774129520264,"version":"3.50.1"},"reference-count":167,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3385449","type":"journal-article","created":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T18:46:47Z","timestamp":1712342807000},"page":"52325-52351","source":"Crossref","is-referenced-by-count":46,"title":["Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8844-6654","authenticated-orcid":false,"given":"K.","family":"Sasikumar","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8945-6412","authenticated-orcid":false,"given":"Sivakumar","family":"Nagarajan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3129224"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_63"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/confluence.2019.8776907"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.09.024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-022-01760-y"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-021-3393-x"},{"key":"ref7","first-page":"526","article-title":"Comparable and analytical study between some security issues in cloud computing","volume-title":"Proc. 20th Int. Conf. Interact. Collaborative Learn.","volume":"2","author":"El-Seoud"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUDCOMP.2015.7149654"},{"key":"ref9","volume-title":"The Latest Cloud Computing Statistics [Internet]","year":"2023"},{"key":"ref10","volume-title":"Cloud Computing Statistics Highlights-Techopedia [Internet]","year":"2023"},{"key":"ref11","volume-title":"Worldwide Public Cloud Spending to Reach 600 Billionin2023-cxtoday [Internet]","year":"2023"},{"key":"ref12","volume-title":"Alarming Cyber Security Facts to Know for 2021 Beyondcybertalk [Internet]","year":"2023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2448095"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2388446"},{"key":"ref15","volume-title":"Cost a Data Breach Rep. 2023-IBM [Internet]","year":"2023"},{"key":"ref16","volume-title":"Data Breach Investigations Report-Verizon [Internet]","year":"2023"},{"key":"ref17","volume-title":"NIST Definition of Cloud Computing-Winthrop [Internet]","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/iccctam.2012.6488097"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icsgrc.2015.7412454"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icsmc.2011.6083853"},{"issue":"1","key":"ref21","first-page":"25","article-title":"Enhancement of cloud security using snort","volume":"7","author":"Thakkar","year":"2019","journal-title":"Int. J. Distrib. Cloud Comput."},{"issue":"15","key":"ref22","first-page":"1","article-title":"Security in cloud computing","volume":"96","author":"Chowdhury","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/smartworld-uic-atc-scalcom-iop-sci.2019.00093"},{"issue":"9","key":"ref24","first-page":"41","article-title":"Review of some cryptographic algorithms in cloud computing","volume":"21","author":"Alharbi","year":"2021","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/icecce.2014.7086640"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2012.16"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijin.2022.04.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/icacci.2018.8554553"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/icsemr.2014.7043664"},{"issue":"4","key":"ref31","first-page":"785","article-title":"Enhanced symmetric encryption technique for securing users\u2019 data in public cloud environment","volume":"22","author":"A Fairosebanu","year":"2022","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.f8395.088619"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3324875"},{"issue":"2","key":"ref34","first-page":"96","article-title":"Hidden data transmission variable DNA technology","volume":"7","author":"Paspula","year":"2017","journal-title":"Int. J. Electron. Inf. Eng."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1009-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2017-0220"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/02522667.2017.1413041"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/roedunet.2013.6511755"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/icece.2012.6471609"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/iceca.2017.8212786"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0303-2647(00)00083-6"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14257\/ijbsbt.2014.6.5.22"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8237-5_59"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0851-z"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100264"},{"issue":"1","key":"ref46","first-page":"167","article-title":"Hybrid DNA cryptography method using different key generation techniques","volume":"21","author":"Vidhya","year":"2021","journal-title":"Adv. Appl. Math. Sci."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108426"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/c3it.2015.7060130"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.041"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102160"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10102-8"},{"key":"ref52","article-title":"Introduction to elliptic curve cryptography","author":"Oswald","year":"2002","journal-title":"Inst. Appl. Inf. Process. Commun."},{"key":"ref53","volume-title":"Elliptical Curve Cryptography [Internet]","year":"2023"},{"key":"ref54","article-title":"Elliptic curve cryptography","author":"Muyinda","year":"2009","journal-title":"Afr. Inst. Math. Sci. (AIMS)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090516"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881444"},{"key":"ref57","volume-title":"The Elliptic Curve Diffie\u2013Hellman (ECDH) [Internet]","year":"2024"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1049\/cds2.12111"},{"key":"ref59","article-title":"Comparative study on the performance of elliptic curve cryptography algorithms with cryptography through RSA algorithm","author":"Saho","year":"2020","journal-title":"CARI 2020-Colloque Africain Sur La Recherche En Informatique Et En Math\u00e9matiques Apliqu\u00e9es"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-004-3808-4"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68164-9_26"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2019.2905899"},{"issue":"1","key":"ref63","first-page":"1","article-title":"A survey on elliptic curve cryptography (ECC)","volume":"1","author":"Nimbhorkar","year":"2012","journal-title":"Int. J. Adv. Stud. Comput. Sci. Eng."},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.06.054"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106319"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.020071"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03777-y"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1504\/ijaip.2021.119018"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.4018\/ijkss.2020100105"},{"issue":"1","key":"ref70","first-page":"56","article-title":"Secured data storage and retrieval using elliptic curve cryptography in cloud","volume":"18","author":"Suthanthiramani","year":"2021","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref71","first-page":"593","article-title":"Modified elliptic curve cryptography model for personal health record sharing in cloud with trust valuation","volume":"1","author":"Sukte","year":"2022","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05233-z"},{"key":"ref73","volume-title":"Homomorphic Encryption: What is It How Is It Used-Vena FI [Internet]","year":"2023"},{"key":"ref74","volume-title":"Homomorphic Encryption [Internet]","year":"2023"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref76","volume-title":"Introduction to CKKS Encryption Scheme [Internet]","year":"2024"},{"key":"ref77","volume-title":"Introduction to BGV Encryption Scheme [Internet]","year":"2024"},{"key":"ref78","volume-title":"Introduction to BFV Encryption Scheme [Internet]","year":"2024"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.310"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-023-01896-2"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i4.pp4388-4400"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103463"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3100852"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3036899"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC55534.2022.00016"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103463"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3197634"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_16"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04850-4"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103742"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00425-7"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/icecco48375.2019.9043254"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.33093\/jiwe.2022.1.2.1"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1515\/comp-2020-0105"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-07013-6"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.health.2023.100149"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2020.1859799"},{"issue":"9","key":"ref100","first-page":"2253","article-title":"Blowfish algorithm: A detailed study","volume":"3","author":"Parihar","year":"2016","journal-title":"Int. J. For Technol. Res. In Eng."},{"issue":"1","key":"ref101","first-page":"11","article-title":"Advanced encryption standard (AES) algorithm to encrypt and decrypt data","volume":"16","author":"Abdullah","year":"2017","journal-title":"Cryptogr. Netw. Secur."},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/mmit.2010.186"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071128"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ifost.2011.6021216"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07539-0"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3242616"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.014466"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.10.070"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.015129"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2021.0120604"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04964-9"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02942-2"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07134-3"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10591-4_2"},{"key":"ref115","volume-title":"An Overview Lightweight Cipher [Internet]","year":"2024"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1513-8_13"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2984317"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107418"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212567"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.024902"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1142\/s0219467823500353"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v20i3.23297"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5459-7"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_4"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_17"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_20"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.5120\/16883-6923"},{"key":"ref129","first-page":"1","article-title":"Block ciphers for the IoT\u2014SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared","volume-title":"Proc. Appel Block CF","author":"Appel"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/11733447_16"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16657-1_56"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_13"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.5152\/electrica.2020.20002"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2021.01.013"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103444"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7016554"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1177\/15501329221084223"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118655"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-08188-8"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2725953"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15463-1"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.3390\/sym15071305"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2022.2075085"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.04.057"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-022-09612-3"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00442-6"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.3390\/s23031415"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i3.pp2589-2599"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v12i1.4590"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.030899"},{"key":"ref151","volume-title":"Securitiy Analysis Cryptographic Algorithms [Internet]","year":"2023"},{"key":"ref152","volume-title":"Chapter 13 Attacks on Cryptosystems-facweb [Internet]","year":"2023"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/745\/1\/012039"},{"key":"ref154","volume-title":"Avalanche Effect Cryptography [Internet]","year":"2023"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2017.1384917"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/420\/1\/012111"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.32890\/jict2020.19.3.1"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2021.1965918"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V69I10P201"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.2174\/2666255813666190911114909"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v10i1.2493"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3052867"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3188110"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2023.2175117"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100530"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00756-z"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/CUBE.2013.20"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10493043.pdf?arnumber=10493043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T17:38:00Z","timestamp":1744738680000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10493043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":167,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3385449","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}