{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:30:57Z","timestamp":1774593057230,"version":"3.50.1"},"reference-count":39,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,1]]},"abstract":"<jats:p>The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the demand service model of remote data centres. However, outsourcing personal and confidential data to the remote data servers is challenging for the reason of new issues involved in data privacy and security. Therefore, the traditional advanced encryption standard (AES) algorithm needs to be enhanced in order to cope with the emerging security threats in the cloud environment. This research presents a framework with key features including enhanced security and owner\u2019s data privacy. It modifies the 128 AES algorithm to increase the speed of the encryption process, 1000 blocks per second, by the double round key feature. However, traditionally, there is a single round key with 800 blocks per second. The proposed algorithm involves less power consumption, better load balancing, and enhanced trust and resource management on the network. The proposed framework includes deployment of AES with 16, 32, 64, and 128 plain text bytes. Simulation results are visualized in a way that depicts suitability of the algorithm while achieving particular quality attributes. Results show that the proposed framework minimizes energy consumption by 14.43%, network usage by 11.53%, and delay by 15.67%. Hence, the proposed framework enhances security, minimizes resource utilization, and reduces delay while deploying services of computational clouds.<\/jats:p>","DOI":"10.1155\/2020\/8863345","type":"journal-article","created":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T23:33:19Z","timestamp":1599003199000},"page":"1-16","source":"Crossref","is-referenced-by-count":53,"title":["Secure Framework Enhancing AES Algorithm in Cloud Computing"],"prefix":"10.1155","volume":"2020","author":[{"given":"Ijaz Ahmad","family":"Awan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Superior College, Lahore, Pakistan"},{"name":"University of Engineering and Technology, Lahore, Pakistan"}]},{"given":"Muhammad","family":"Shiraz","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Federal Urdu University of Arts, Science and Technology, Islamabad, Pakistan"}]},{"given":"Muhammad Usman","family":"Hashmi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Superior College, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1839-1412","authenticated-orcid":true,"given":"Qaisar","family":"Shaheen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Superior College, Lahore, Pakistan"}]},{"given":"Rizwan","family":"Akhtar","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Jiangsu University of Science and Technology, Zhenjiang, China"}]},{"given":"Allah","family":"Ditta","sequence":"additional","affiliation":[{"name":"Department of Information Sciences, Division of Science & Technology, University of Education, Lahore, Pakistan"}]}],"member":"311","reference":[{"issue":"2","key":"1","first-page":"326","volume":"21","year":"2019","journal-title":"International Journal of Network Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2018.090347"},{"issue":"18","key":"3","first-page":"3345","volume":"118","year":"2018","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9852472"},{"issue":"3","key":"5","volume":"4","year":"2018","journal-title":"International Journal on Future Revolution in Computer Science & Communication Engineering"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.b2239.078219"},{"issue":"6","key":"7","volume":"2","year":"2015","journal-title":"International Journal of Research Studies in Computer Science and Engineering"},{"issue":"5","key":"9","volume":"6","year":"2018","journal-title":"IJIRMPS"},{"issue":"4","key":"10","volume":"8","year":"2019","journal-title":"International Journal of Engineering and Advanced Technology (IJEAT)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2018.2847347"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9802475"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.3390\/sym11121484"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2852563"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2018.4239"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1196\/1\/012049"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2018.1095"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67621-0_6"},{"issue":"18","key":"20","first-page":"7962","volume":"12","year":"2017","journal-title":"International Journal of Applied Engineering Research"},{"key":"21","year":"2018"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.4108\/eai.15-5-2018.155167"},{"issue":"11","key":"23","volume":"14","year":"2019","journal-title":"ARPN Journal of Engineering and Applied Sciences"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.4018\/jeco.2018010101"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.21833\/ijaas.2018.01.003"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.11591\/ijeei.v7i1.652"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc2020010"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02878-7"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.b3669.078219"},{"issue":"6","key":"32","volume":"6","year":"2018","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"issue":"1","key":"33","volume":"8","year":"2019","journal-title":"International Journal of Recent Technology and Engineering"},{"issue":"1","key":"34","first-page":"40","volume":"8","year":"2018","journal-title":"IJEIE"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.01.204"},{"issue":"1","key":"38","first-page":"21","volume":"32","year":"2009","journal-title":"IEEE Data Engineering Bulletin"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1166\/jolpe.2007.139"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2017.080659"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/ijett-v33p223"},{"issue":"7","key":"46","volume":"8","year":"2019","journal-title":"International Journal of Scientific & Technology Research"},{"issue":"9","key":"47","first-page":"245","volume":"8","year":"2019","journal-title":"International Journal of Computer Science and Mobile Computing, IJCSMC"},{"issue":"3","key":"48","volume":"5","year":"2015","journal-title":"Computer Applications Research"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8863345.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8863345.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8863345.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T23:33:24Z","timestamp":1599003204000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8863345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,1]]},"references-count":39,"alternative-id":["8863345","8863345"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8863345","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,1]]}}}