{"id":"https://openalex.org/W3081798277","doi":"https://doi.org/10.1155/2020/8863345","title":"Secure Framework Enhancing AES Algorithm in Cloud Computing","display_name":"Secure Framework Enhancing AES Algorithm in Cloud Computing","publication_year":2020,"publication_date":"2020-09-01","ids":{"openalex":"https://openalex.org/W3081798277","doi":"https://doi.org/10.1155/2020/8863345","mag":"3081798277"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8863345","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8863345","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8863345.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8863345.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046610566","display_name":"Ijaz Ahmad Awan","orcid":null},"institutions":[{"id":"https://openalex.org/I142732210","display_name":"University of Engineering and Technology Lahore","ror":"https://ror.org/0051w2v06","country_code":"PK","type":"education","lineage":["https://openalex.org/I142732210"]},{"id":"https://openalex.org/I4210100043","display_name":"Superior University","ror":"https://ror.org/00yh88643","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210100043"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ijaz Ahmad Awan","raw_affiliation_strings":["Department of Computer Science, Superior College, Lahore, Pakistan","University of Engineering and Technology, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Superior College, Lahore, Pakistan","institution_ids":["https://openalex.org/I4210100043"]},{"raw_affiliation_string":"University of Engineering and Technology, Lahore, Pakistan","institution_ids":["https://openalex.org/I142732210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069957039","display_name":"Muhammad Shiraz","orcid":"https://orcid.org/0000-0002-0149-7413"},"institutions":[{"id":"https://openalex.org/I40597779","display_name":"Federal Urdu University","ror":"https://ror.org/02b52th27","country_code":"PK","type":"education","lineage":["https://openalex.org/I40597779"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Shiraz","raw_affiliation_strings":["Department of Computer Science, Federal Urdu University of Arts, Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Federal Urdu University of Arts, Science and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I40597779"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103130545","display_name":"Muhammad Usman Hashmi","orcid":"https://orcid.org/0000-0002-9948-2251"},"institutions":[{"id":"https://openalex.org/I4210100043","display_name":"Superior University","ror":"https://ror.org/00yh88643","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210100043"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Usman Hashmi","raw_affiliation_strings":["Department of Computer Science, Superior College, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Superior College, Lahore, Pakistan","institution_ids":["https://openalex.org/I4210100043"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022700087","display_name":"Qaisar Shaheen","orcid":"https://orcid.org/0000-0002-1839-1412"},"institutions":[{"id":"https://openalex.org/I4210100043","display_name":"Superior University","ror":"https://ror.org/00yh88643","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210100043"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Qaisar Shaheen","raw_affiliation_strings":["Department of Computer Science, Superior College, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Superior College, Lahore, Pakistan","institution_ids":["https://openalex.org/I4210100043"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059039334","display_name":"Rizwan Akhtar","orcid":"https://orcid.org/0000-0003-0023-5056"},"institutions":[{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rizwan Akhtar","raw_affiliation_strings":["School of Electronics and Information, Jiangsu University of Science and Technology, Zhenjiang, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information, Jiangsu University of Science and Technology, Zhenjiang, China","institution_ids":["https://openalex.org/I4210096899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020009828","display_name":"Allah Ditta","orcid":"https://orcid.org/0000-0003-1519-5982"},"institutions":[{"id":"https://openalex.org/I3130814776","display_name":"University of Okara","ror":"https://ror.org/02fmg6q11","country_code":"PK","type":"education","lineage":["https://openalex.org/I3130814776"]},{"id":"https://openalex.org/I5100685","display_name":"University of Education","ror":"https://ror.org/052z7nw84","country_code":"PK","type":"education","lineage":["https://openalex.org/I5100685"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Allah Ditta","raw_affiliation_strings":["Department of Information Sciences, Division of Science & Technology, University of Education, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Sciences, Division of Science & Technology, University of Education, Lahore, Pakistan","institution_ids":["https://openalex.org/I5100685","https://openalex.org/I3130814776"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5022700087"],"corresponding_institution_ids":["https://openalex.org/I4210100043"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":8.3827,"has_fulltext":true,"cited_by_count":79,"citation_normalized_percentile":{"value":0.9785891,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9004009962081909},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.680088996887207},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6037025451660156},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5118057131767273},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47880086302757263},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4590946137905121},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.457481324672699},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.41829609870910645},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.41292059421539307},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4089086651802063},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3866085410118103},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3717805743217468},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11248883605003357}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9004009962081909},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.680088996887207},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6037025451660156},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5118057131767273},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47880086302757263},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4590946137905121},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.457481324672699},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.41829609870910645},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.41292059421539307},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4089086651802063},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3866085410118103},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3717805743217468},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11248883605003357},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8863345","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8863345","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8863345.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6f6db600465a409a97de23152f6dc254","is_oa":true,"landing_page_url":"https://doaj.org/article/6f6db600465a409a97de23152f6dc254","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8863345","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8863345","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8863345.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.5799999833106995,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3081798277.pdf","grobid_xml":"https://content.openalex.org/works/W3081798277.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1563431492","https://openalex.org/W2045287414","https://openalex.org/W2049188610","https://openalex.org/W2466054197","https://openalex.org/W2729223247","https://openalex.org/W2751373504","https://openalex.org/W2770336065","https://openalex.org/W2780576747","https://openalex.org/W2791710146","https://openalex.org/W2794686126","https://openalex.org/W2796447772","https://openalex.org/W2803839231","https://openalex.org/W2809526465","https://openalex.org/W2881540367","https://openalex.org/W2885367982","https://openalex.org/W2899732343","https://openalex.org/W2912787478","https://openalex.org/W2936869256","https://openalex.org/W2944785541","https://openalex.org/W2955785612","https://openalex.org/W2990894493","https://openalex.org/W2993088751","https://openalex.org/W3104807209","https://openalex.org/W4234957192","https://openalex.org/W4252450736","https://openalex.org/W4256736024"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W4231184955","https://openalex.org/W2325765407","https://openalex.org/W4315926519","https://openalex.org/W3085294341","https://openalex.org/W350349969","https://openalex.org/W3214026606","https://openalex.org/W2809887432","https://openalex.org/W3110687098","https://openalex.org/W2057612674"],"abstract_inverted_index":{"The":[0,141,160],"tremendous":[1],"growth":[2],"of":[3,35,55,114,165,186,228],"computational":[4,25,229],"clouds":[5],"has":[6],"attracted":[7],"and":[8,24,42,62,100,151,154,171,209,222],"enabled":[9,20],"intensive":[10,26],"computation":[11],"on":[12,30,157],"resource-constrained":[13],"client":[14],"devices.":[15],"Predominantly,":[16],"smart":[17],"mobiles":[18],"are":[19,178],"to":[21,45,73,78,110],"deploy":[22],"data":[23,37,44,48,60,102],"applications":[27],"by":[28,122,203,207,211],"leveraging":[29],"the":[31,46,53,65,81,86,106,112,115,123,158,187,197,214],"demand":[32],"service":[33],"model":[34],"remote":[36,47],"centres.":[38],"However,":[39,128],"outsourcing":[40],"personal":[41],"confidential":[43],"servers":[49],"is":[50,131],"challenging":[51],"for":[52],"reason":[54],"new":[56],"issues":[57],"involved":[58],"in":[59,76,85,180],"privacy":[61],"security.":[63],"Therefore,":[64],"traditional":[66],"advanced":[67],"encryption":[68,116],"standard":[69],"(AES)":[70],"algorithm":[71,109,143,188],"needs":[72],"be":[74],"enhanced":[75,98,152],"order":[77],"cope":[79],"with":[80,94,136,167],"emerging":[82],"security":[83,99],"threats":[84],"cloud":[87],"environment.":[88],"This":[89],"research":[90],"presents":[91],"a":[92,132,181],"framework":[93,162,199,216],"key":[95,126,135],"features":[96],"including":[97],"owner\u2019s":[101],"privacy.":[103],"It":[104],"modifies":[105],"128":[107,172],"AES":[108,166],"increase":[111],"speed":[113],"process,":[117],"1000":[118],"blocks":[119,138],"per":[120,139],"second,":[121],"double":[124],"round":[125,134],"feature.":[127],"traditionally,":[129],"there":[130],"single":[133],"800":[137],"second.":[140],"proposed":[142,161,198,215],"involves":[144],"less":[145],"power":[146],"consumption,":[147],"better":[148],"load":[149],"balancing,":[150],"trust":[153],"resource":[155,220],"management":[156],"network.":[159],"includes":[163],"deployment":[164],"16,":[168],"32,":[169],"64,":[170],"plain":[173],"text":[174],"bytes.":[175],"Simulation":[176],"results":[177],"visualized":[179],"way":[182],"that":[183,196],"depicts":[184],"suitability":[185],"while":[189,225],"achieving":[190],"particular":[191],"quality":[192],"attributes.":[193],"Results":[194],"show":[195],"minimizes":[200,219],"energy":[201],"consumption":[202],"14.43%,":[204],"network":[205],"usage":[206],"11.53%,":[208],"delay":[210,224],"15.67%.":[212],"Hence,":[213],"enhances":[217],"security,":[218],"utilization,":[221],"reduces":[223],"deploying":[226],"services":[227],"clouds.":[230]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":26},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":11}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
