Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
The design, use and impact of cloud computing during the covid-19 crises
Author(s):
1. Mujeeb-ur-Rehaman Jamali: Institute of Mathematics and Computer Science, University of Sindh Jamshoro Pakistan,,
2. Nadeem Ahmed Kansro: Department of Computer Science, Sindh University Campus,Larkana,Pakistan
3. Shahmurad Chandio: Institute of Mathematics and Computer Science, University of Sindh Jamshoro Pakistan,,
4. Ghulam Nabi Rajper: Institute of Computer Science and Information Technology, Shah Abdul Latif University Khairpur Mir's,Sindh,Pakistan
5. Syed Akbar Ali Shah: Institute of Mathematics and Computer Science, University of Sindh Jamshoro Pakistan,,
Abstract:
The incidence and severity of cybercrime have increased recently, and worries about personal data protection are widespread. Cybercriminals are taking advantage of the COVID-19 pandemic's crucial reliance on cloud computing emerging virtual environments by organizations and individuals. One of the biggest issues is the security of data that is stored and transmitted over the cloud. It is crucial to protect the privacy of data stored by Cloud Service Providers since in the Cloud, private and confidential information is kept on external servers and hidden from Cloud Service Users. Concerns regarding the safety of personal data are pervasive, and cybercrime has lately grown in frequency and severity. The various researchers presented their work of vulnerabilities of the data security over the cloud environment and provides encryption data at rest with symmetric key cryptography where the same secret key is used for encryption and decryption. This research takes a different strategy than that which has previously been suggested by other researches. An application-level security is proposed instead of data at rest encryption to safely store data at rest. In the public cloud computing environment, our developed system guarantees the privacy and confidentiality of data while it is at rest. In order to guarantee data security against hostile infiltration, the system also ensured that data must be safeguarded during, and after a transaction while it is being stored on the cloud storage. It can be inferred from the result that our system, when compared to other symmetric algorithms with less consistent behavior and scatter of value from mean, took less time to perform cryptographic operations.
Page(s): 181-189
DOI: DOI not available
Published: Journal: VFAST Transactions on Software Engineering, Volume: 10, Issue: 4, Year: 2022
Keywords:
COVID19 , Cloud computing , Covid19 , Cybercrime , electronic electronic commerce
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

5

Views