References
- Al-Qtiemat, E. M. A. N., Z. E. Y. A. D. Al-Odat. Examining Cloud Security: Identifying Risks and the Implemented Mitigation Strategies. – Journal of Theoretical and Applied Information Technology, Vol. 102, 2024, No 7.
- Amajuoyi, C. P., L. K. Nwobodo, M. D. Adegbola. Transforming Business Scalability and Operational Flexibility with Advanced Cloud Computing Technologies. – Computer Science & IT Research Journal, Vol. 5, 2024, No 6, pp. 1469-1487.
- Anusha, P., R. Maruthi, D. M. Kumar, H. P. Begum. Double Encryption Technique for Sharing and Storing Images in the Cloud Environment. – In: Proc. of 4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT’24), IEEE, 2024, pp. 1-4.
- Arogundade, O. R. Strategic Security Risk Management in Cloud Computing: A Comprehensive Examination and Application of the Risk Management Framework. – International Advanced Research Journal in Science, Engineering and Technology, Vol. 11, 2024, No 1.
- Okazaki, N., S. Usuzaki, T. Waki, H. Kawagoe, M. Park, H. Yamaba, K. Aburada. Optimal Weighted Voting-Based Collaborative Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar. – Future Internet, Vol. 16, 2024, No 8, 259.
- Haq, M. Y. M., A. Abhishta, S. Zeijlemaker, A. Chau, M. Siegel, L. J. Nieuwenhuis. Measuring Malware Detection Capability for Security Decision Making. – In: Proc. of IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’24), IEEE, 2024, pp. 342-351.
- Aydin, Y., A. M. Garipcan, F. Özkaynak. A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms. – Arabian Journal for Science and Engineering, 2024, pp. 1-14.
- Bezerra, J. I. M., A. Molter, G. Machado, R. I. Soares, V. V. D. A. Camargo. A Novel Single Kernel Parallel Image Encryption Scheme Based on a Chaotic Map. – Journal of Real-Time Image Processing, Vol. 21, 2024, No 4, pp. 1-13.
- Chauhan, R. Hybrid Approaches for Improving Cybersecurity and Network Intrusion Systems. – In: Hybrid Information Systems: Non-Linear Optimization Strategies with Artificial Intelligence, 2024, p. 153.
- Chen, A. C. Evaluation of Advanced Encryption Standard Algorithms for Image Encryption. – In: Proc. of International Conference on Smart Systems for Applications in Electrical Sciences (ICSSES’24), IEEE, 2024, pp. 1-6.
- Deshmukh, P. M., A. S. Gughane, P. L. Hasija, S. P. Katpale. Maintaining File Storage Security in Cloud Computing. – International Journal of Emerging Technology and Advanced Engineering, Vol. 2, 2012, No 10, pp. 2250-2459.
- Gilbert, H., H. Handschuh. Security Analysis of SHA-256 and Sisters. – In: Proc. of International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, Springer, 2003, pp. 175-193.
- Gowthaman, A., M. Sumathi. Performance Study of Enhanced SHA-256 Algorithm. – International Journal of Applied Engineering Research, Vol. 10, 2015, No 4, pp. 10921-10932.
- Gupta, A., N. Banakar, C. Kumar, M. Aryan, U. Purushotham. Design and Implementation of an Efficient Fingerprint Authentication Algorithm Using SHA-512. – In: Proc. of 3rd International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE’24), IEEE, 2024, pp. 1-7.
- Gupta, S., P. Kumar, A. Sardana, A. Abraham. A Secure and Lightweight Approach for Critical Data Security in Cloud. – In: Proc. of 4th International Conference on Computational Aspects of Social Networks (CASoN’12), IEEE, 2012, pp. 315-320.
- Hossain, M. A., M. B. Hossain, M. S. Uddin, S. M. Imtiaz. Performance Analysis of Different Cryptography Algorithms. – International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, 2016, No 3.
- Hussain, M. Z., M. Z. Hasan, A. N. Qureshi, G. Mustafa. Implementation of a Blockchain-Based Secure Cloud Computing Mechanism for Transactions. – In: Blockchain-Based Internet of Things, Chapman and Hall/CRC, 2024, pp. 146-166.
- Jain, S., S. Thaseen. Revolutionizing Malware Detection: Feature-Based Approach for Targeting Diverse Malware Categories. – In: Proc. of IEEE International Carnahan Conference on Security Technology (ICCST’23), IEEE, 2023, pp. 1-5.
- Jain, N., P. Singhal. Secure Cloud Data Storage and Sharing. – Journal of Informatics Electrical and Electronics Engineering (JIEEE), Vol. 5, 2024, No 1, pp. 1-12.
- Kishore, N., P. Raina. Parallel Cryptographic Hashing: Developments in the Last 25 Years. – Cryptologia, Vol. 43, 2019, No 6, pp. 504-535.
- Lanke, R., A. M. Z. Rahman, R. Bhardwaj, D. S. Reddy, P. Jain, T. R. Mahesh. Cloud Cryptography: Mechanism of Different Encryption Standards. – In: Proc. of 11th International Conference on Computing for Sustainable Global Development (INDIACom’24), IEEE, 2024, pp. 356-360.
- Marquis, Y. A. From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts. – Journal of Engineering Research and Reports, Vol. 26, 2024, No 5, pp. 138-154.
- Mohammed, A. S., M. Alfudail, A. Alkhulaiwi, A. Bashar. Performance Analysis of Cryptographic Algorithms in Cloud Computing Systems. – In: Proc. of International Conference on Inventive Computation Technologies (ICICT’24), IEEE, 2024, pp. 1399-1405.
- Mohammed, Z. A., K. A. Hussein. PRC6: Hybrid Lightweight Cipher for Enhanced Cloud Data Security in Parallel Environment. – Security and Privacy, 2024, e413.
- Mustafa, N. A. A. Analysis of Attackers’ Methods with Hashing Secure Password Using CSPRNG and PBKDF2. – Wasit Journal of Engineering Sciences, Vol. 12, 2024, No 2, pp. 60-70.
- Myint, S. M., M. M. Myint, A. A. Cho. A Study of SHA Algorithm in Cryptography. – International Journal of Trend in Scientific Research and Development, Vol. 3, 2019, pp. 1453-1454.
- Olanrewaju, R. F., K. Abdullah, H. Darwis. Enhancing Cloud Data Security Using a Hybrid of Advanced Encryption Standard and Blowfish Encryption Algorithms. – In: Proc. of 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT’18), IEEE, 2018, pp. 18-23.
- Rawal, B. S., S. S. Vivek. Secure Cloud Storage and File Sharing. – In: Proc. of IEEE International Conference on Smart Cloud (SmartCloud’17), IEEE, 2017, pp. 78-83.
- Sasikumar, K., S. Nagarajan. Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing. – IEEE Access, 2024.
- Sattaiah, K., K. Chinnaiah. Providing Security in Genesis and Other Blocks of Blockchain Technology Using SHA-256 Algorithm. – In: Proc. of 3rd International Conference for Innovation in Technology (INOCON’24), IEEE, 2024, pp. 1-6.
- Sharma, M. S. A Study on Integrated Crypto-Biometric System to Protect Against Unauthorized Access of Data. – Journal of Interdisciplinary and Multidisciplinary Research (JIMR), Vol. 19, 2024, No 4.
- Srikanth, B., J. V. R. Ravindra, G. A. E. Satish, P. Kumar, F. Shaik. Implementation of an Improved High-Speed SHA-256 Algorithm from RTL to GDSII Using Verilog HDL. – In: Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Vol. 4. Cham, Springer International Publishing, 2024, pp. 1-17.
- Su, B., Z. H. U. Yongcong, J. Pang, C. Wang, J. Li, X. Liu. Design of Security Protection Framework for Power Grid Cloud Application API Based on Zero Trust. – In: Proc. of 8th International Conference on Energy System, Electricity, and Power (ESEP’2023), SPIE, Vol. 13159, 2024, pp. 2035-2043.
- Tran, T. H., H. L. Pham, Y. Nakashima. A High-Performance Multimem SHA-256 Accelerator for Society 5.0. – IEEE Access, Vol. 9, 2021, pp. 39182-39192.
- Wagh, A., S. Yadav, P. Patil, S. Magdum, S. Shiravale. Enhanced File Storage on Cloud Using Hybrid Cryptography Algorithm. – In: Proc. of 3rd International Conference on Power Electronics and IoT Applications in Renewable Energy and its Control (PARC’24), IEEE, 2024, pp. 398-404.
- Wang, J., G. Liu, Y. Chen, S. Wang. Construction and Analysis of SHA-256 Compression Function Based on Chaos S-box. – IEEE Access, Vol. 9, 2021, pp. 61768-61777.
- Wang, Z., X. Dong, Y. Kang, H. Chen, Q. Wang. An Example of Parallel Merkle Tree Traversal: Post-Quantum Leighton-Micali Signature on the GPU. – ACM Transactions on Architecture and Code Optimization, 2024.
- Wu, R., X. Zhang, M. Wang, L. Wang. A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC. – In: Proc. of 22nd International Conference on Advanced Communication Technology (ICACT’20), IEEE, 2020, pp. 1242-1247.
- MalwareBazaar (Online). https://bazaar.abuse.ch/
- Ketipov, R., R. Schnalle, L. Doukovska, D. Dehez. Managing Cybersecurity: Digital Footprint Threats. – Cybernetics and Information Technologies, Vol. 24, 2024, No 3, pp. 151-162.
