DATA ENCRYPTION ALGORITHM AES BY USING BLOCKCHAIN TECHNOLOGY: A REVIEW
Abstract
Blockchain is used as encryption algorithm in cryptocurrency, but less researches are found to study blockchain for data encryption. Data encryption is needed to protect the data from data theft. We know about data encryption, there are RSA, LEAP, AES, and other algorithms. This research proposed a review in AES algorithm for data encryption within blockchain technology. The research process is followed by determining library, then creating relevant questions and criteria. For good opportunity in the future, this paper generated suggestions and opportunities so that better research can be established in data encryption.
Keywords
Full Text:
PDFReferences
Adams, C. 2020. A Privacy‐Preserving Blockchain with Fine‐grained Access Control. Security and Privacy, 3(2): 1–9. doi.org/10.1002/spy2.97.
Agarkar, A. & Agrawal, H. 2019. A Review and Vision on Authentication and Privacy Preservation Schemes in Smart Grid Network. Security and Privacy, 2(2): 1–18. doi.org/10.1002/spy2.62.
Akhil, K. M., Kumar, M.P., & Pushpa, B.R. 2017. Enhanced Cloud Data Security Using AES Algorithm. In 2017 International Conference on Intelligent Computing and Control (I2C2), January:1–5. IEEE. doi.org/10.1109/I2C2.2017.8321820.
Al-Ahmad, A.S., Kahtan, H., Hujainah, F., & Jalab, H.A. 2019. Systematic Literature Review on Penetration Testing for Mobile Cloud Computing Applications. IEEE Access, 7: 173524–40. doi.org/10.1109/ACCESS.2019.2956770.
Alharby, M., Aldweesh, A., & Moorsel, A.V. 2018. Blockchain-Based Smart Contracts: A Systematic Mapping Study of Academic Research. In 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB), 1–6. IEEE. doi.org/10.1109/ICCBB.2018.8756390.
Babrahem, A.S., & Monowar, M.M. 2018. Preserving Confidentiality and Privacy of the Patient’s EHR Using the OrBAC and AES in Cloud Environment. International Journal of Computers and Applications, 7074. doi.org/10.1080/1206212X.2018.1505025.
Bak, S., Pyo, Y., & Jeong, J. 2019. Protection of EEG Data Using Blockchain Platform. In 2019 7th International Winter Conference on Brain-Computer Interface (BCI), 1–3. doi.org/10.1109/IWW-BCI.2019.8737260.
Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., & Sastry, H. 2016. Security Algorithms for Cloud Computing. Procedia Computer Science, 85: 535–42. doi.org/10.1016/j.procs.2016.05.215.
Boomija, M.D. 2016. Secure Data Sharing through Additive Similarity Based ElGamal Like Encryption. In 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), 652–55. IEEE. doi.org/10.1109/AEEICB.2016.7538370.
Bratspies, R.M. 2018. Cryptocurrency and the Myth of the Trustless Transaction. Michigan Telecommunications and Technology Law Review, 25(1): 2–54. doi.org/10.2139/ssrn.3141605.
Chen, S, Wei-Hu, W., & Li, Z. 2019. High Performance Data Encryption with AES Implementation on FPGA. In 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), 149–53. doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00036.
Christo, M.S., Merjora A.A., Sarathy G.P., Priyanka, C., & Kumari R.M. 2019. An Efficient Data Security in Medical Report Using Block Chain Technology. In 2019 International Conference on Communication and Signal Processing (ICCSP), 0606–10. IEEE. doi.org/10.1109/ICCSP.2019.8698058.
Costa, L., Neto, A., Pinheiro, B., Cordeiro, W., Araújo, R., & Abelém, A. 2019. Securing Light Clients in Blockchain with DLCP. International Journal of Network Management, 29(3): e2055. doi.org/10.1002.nem.2055.
Dave, D., Parikh, S., Patel, R., & Doshi, N. 2019. A Survey on Blockchain Technology and Its Proposed Solutions. Procedia Computer Science, 160: 740–45. doi.org/10.1016/j.procs.2019.11.017.
Franciscon, E.A, Nascimento, M.P., Granatyr, J., Weffort, M.R., Lessing, O.R., & Scalabrin, E.E. 2019. A Systematic Literature Review of Blockchain Architectures Applied to Public Services. 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design, 33–38. doi.org/10.1109/CSCWD.2019.8791888.
Guo, Y., Kun, Lv., Shitang-Yu, S., Zou, J., Zhang, B., & Shao, Z. 2019. A High Performance Blockchain Platform for Intelligent Devices. 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), 260–61. doi.org/10.1109/HOTICN.2018.8606017.
Hassan, H.E.R., Tahoun, M., & ElTaweel, G.S. 2020. A Robust Computational DRM Framework for Protecting Multimedia Contents Using AES and ECC. Alexandria Engineering Journal, 59(3): 1275–86. doi.org/10.1016/j.aej.2020.02.020.
Hidayat, T., Azzery, Y., & Mahardiko, R. 2019. Load Balancing Network by Using Round Robin Algorithm: A Systematic Literature Review. Jurnal Online Informatika, 4(2): 85–89. doi.org/10.15575/join.v4i2.446.
Hidayat, T., & Mahardiko, R. 2020. A Systematic Literature Review Method on AES Algorithm for Data Sharing Encryption on Cloud Computing. International Journal of Artificial Intelligence Research, 4(1): 49–57. doi.org/10.29099/ijair.v4i1.154.
Hidayat, T., Mahardiko, R., & Franky, S.T.D. 2020. Method of Systematic Literature Review for Internet of Things in ZigBee Smart Agriculture. In 2020 8th International Conference on Information and Communication Technology (ICoICT), 1–4. doi.org/10.1109/ICoICT49345.2020.9166195.
Holtkemper, D., & Wieninger, S. 2018. Company Data in the Blockchain: A Juxtaposition of Technological Drivers and Potential Applications. PICMET 2018 - Portland International Conference on Management of Engineering and Technology: Managing Technological Entrepreneurship: The Engine for Economic Growth, Proceedings, 1–7. doi.org/10.23919/PICMET.2018.8481811.
Islam, A., & Shin, S.Y. 2020. A Blockchain-Based Secure Healthcare Scheme with the Assistance of Unmanned Aerial Vehicle in Internet of Things. Computers and Electrical Engineering, 84: 106627. doi.org/10.1016/j.compeleceng.2020.106627.
Jain, G., & Sejwar, V. 2017. Improving the Security by Using Various Cryptographic Techniques in Cloud Computing. In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), January:23–28. IEEE. doi.org/10.1109/ICCONS.2017.8250721.
Lee, B.H., Dewi, E.K., & Wajdi, M.F. 2018. Data Security in Cloud Computing Using AES under HEROKU Cloud. In 2018 27th Wireless and Optical Communication Conference (WOCC), 1–5. IEEE. doi.org/10.1109/WOCC.2018.8372705
Li, Y.N., Feng, X., Xie, J. Feng, H., Guan, Z., & Wu, Q. 2020. A Decentralized and Secure Blockchain Platform for Open Fair Data Trading. Concurrency Computation, 32(7): 1–11. doi.org/10.1002/cpe.5578.
Liu, Y., Gong, W., & Fan, W. 2018. Application of AES and RSA Hybrid Algorithm in E-Mail. In 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS), 701–3. IEEE. doi.org/10.1109/ICIS.2018.8466380.
Lo, S.K., Liu, Y., Chia, S.Y., Xu,X., Lu, Q., Zhu, L., & Ning, H. 2019. Analysis of Blockchain Solutions for IoT: A Systematic Literature Review. IEEE Access, 7(1): 58822–35. doi.org/10.1109/ACCESS.2019.2914675.
Lou, J., Zhang, Q., Qi, Z., & Lei, K. 2018. A Blockchain-Based Key Management Scheme for Named Data Networking. In 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), 141–46. IEEE. doi.org/10.1109/HOTICN.2018.8605993.
Lyu, Q., Qi, Y., Zhang, X., Liu, H., Wang, Q., & Zheng, N. 2020. SBAC: A Secure Blockchain-Based Access Control Framework for Information-Centric Networking. Journal of Network and Computer Applications, 149: 102444. doi.org/10.1016/j.jnca.2019.102444.
Madhavapandian, S., & Maruthu, P. 2020. FPGA Implementation of Highly Scalable AES Algorithm Using Modified Mix Column with Gate Replacement Technique for Security Application in TCP/IP. Microprocessors and Microsystems, 73: 102972. doi.org/10.1016/j.micpro.2019.102972.
Makhdoom, I., Abolhasan, M., Abbas, H., & Ni, W. 2019. Blockchain’s Adoption in IoT: The Challenges, and a Way Forward. Journal of Network and Computer Applications, 125: 251–79. Elsevier Ltd. doi.org/10.1016/j.jnca.2018.10.019.
Mohsin, A.H., Zaidan, A.A., Zaidan, B.B., Albahri, O.S., Albahri, A.S., Alsalem, M.A., & Mohammed, K.I. 2019. Based Blockchain-PSO-AES Techniques in Finger Vein Biometrics: A Novel Verification Secure Framework for Patient Authentication. Computer Standards & Interfaces, 66 (October): 103343. doi.org/10.1016/j.csi.2019.04.002.
Nagesh, H. R., & Thejaswini, L. 2017. Study on Encryption Methods to Secure the Privacy of the Data and Computation on Encrypted Data Present at Cloud. In 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC), 383–86. IEEE. doi.org/10.1109/ICBDACI.2017.8070868.
Niya, S.R., Schiller, E., Cepilov, I., Maddaloni, F., Aydinli, K., Surbeck, T., Bocek, T., & Stiller, B. 2019. Adaptation of Proof-of-Stake-Based Blockchains for IoT Data Streams. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 15–16. IEEE. doi.org/10.1109/BLOC.2019.8751260.
Peters, G.W., Panayi, E., & Chapelle, A. 2015. Trends in Cryptocurrencies and Blockchain Technologies: A Monetary Theory and Regulation Perspective. The Journal of Financial Perspectives: FinTech, 3(3): 1–46.
Pitchay, S.A., lhiagem, W.A.A., Ridzuan, F., & Saudi, M.M. 2015. A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing. In 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim), 201–5. IEEE. doi.org/10.1109/UKSim/2015.74.
Preece, J. D., & Easton, J.M. 2018. Towards Encrypting Industrial Data on Public Distributed Networks. In 2018 IEEE International Conference on Big Data (Big Data), 4540–44. IEEE. doi.org/10.1109/BigData.2018.8622246.
Qasem, Y.A.M., Abdullah, R., Jusoh, Y.Y., Atan, Y., & Asadi, S. 2019. Cloud Computing Adoption in Higher Education Institutions: A Systematic Review. IEEE Access, 7: 63722–44. doi.org/10.1109/ACCESS.2019.2916234.
Qiu, J., Lu, X., & Lin, J. 2019. Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process. In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 208–12. IEEE.doi.org/10.1109/CCOMS.2019.8821757.
Reddy, E., & Minnaar, A. 2018. Cryptocurrency: A Tool and Target for Cybercrime. Acta Criminologica: Southern African Journal of Criminology, 31(3): 71–92.
Rosati, P., Fox, G., Kenny, D., & Lynn, T. 2017. Quantifying the Financial Value of Cloud Investments: A Systematic Literature Review. Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom-December: 194–201. doi.org/10.1109/CloudCom.2017.28.
Rotondi, D., Saltarella, M., Giordano, G., & Pellecchia, F. 2019. Distributed Ledger Technology and European Union General Data Protection Regulation Compliance in a Flexible Working Context. Internet Technology Letters, 2(5): e127. doi.org/10.1002/itl2.127.
Salleh, N.A., Hussin, H., Suhaimi, M.A., & Ali, A.M. 2018. A Systematic Literature Review of Cloud Computing Adoption and Impacts among Small Medium Enterprises (SMEs). Proceedings - International Conference on Information and Communication Technology for the Muslim World 2018, 278–84. doi.org/10.1109/ICT4M.2018.00058.
Sharma, P., & Singh, J. 2017. Systematic Literature Review on Software Effort Estimation Using Machine Learning Approaches. In 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), 43–47. IEEE. doi.org/10.1109/ICNGCIS.2017.33.
Shen, C., & Pena-Mora, F. 2018. Blockchain for Cities - A Systematic Literature Review. IEEE Access, 6: 76787–819. doi.org/10.1109/ACCESS.2018.2880744.
Shimbre, N., & Deshpande, P. 2015. Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm. Proceedings - 1st International Conference on Computing, Communication, Control and Automation, ICCUBEA, 35–39. doi.org/10.1109/ICCUBEA.2015.16.
Sivakumar, P.M., Kumar, N., Jayaraj, R., & Kumaran, A.S. 2019. Securing Data and Reducing the Time Traffic Using AES Encryption with Dual Cloud. In 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), 1–5. IEEE. doi.org/10.1109/ICSCAN.2019.8878749.
Surv, N., Wanve, B., Kamble, R., Patil, S., & Katti, J. 2015. Framework for ClientSide AES Encryption Technique in Cloud Computing. Souvenir of the 2015 IEEE International Advance Computing Conference, IACC, 525–28. doi.org/10.1109/IADCC.2015.7154763.
Tawalbeh, L., & Saldamli, G. 2019. Reconsidering Big Data Security and Privacy in Cloud and Mobile Cloud Systems. Journal of King Saud University - Computer and Information Sciences. doi.org/10.1016/j.jksuci.2019.05.007.
Tawalbeh, L., Darwazeh, N.S., Al-Qassas, R.S., & AlDosari, F. 2015. A Secure Cloud Computing Model Based on Data Classification. Procedia Computer Science, 52(1): 1153–58. doi.org/10.1016/j.procs.2015.05.150.
Wang, Z., Tian, Y., & Zhu, J. 2018. Data Sharing and Tracing Scheme Based on Blockchain. Proceeding of 8th International Conference on Logistics, Informatics and Service Sciences, 1–6. doi.org/10.1109/LISS.2018.8593225.
Wutthikarn, R., & Hui, Y.G. 2018. Prototype of Blockchain in Dental Care Service Application Based on Hyperledger Composer in Hyperledger Fabric Framework. In 2018 22nd International Computer Science and Engineering Conference (ICSEC), 1–4. IEEE. doi.org/10.1109/ICSEC.2018.8712639.
Xu, Y. 2018. Section-Blockchain: A Storage Reduced Blockchain Protocol, the Foundation of an Autotrophic Decentralized Storage Architecture. Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, December: 115–25. doi.org/10.1109/ICECCS2018.2018.00020.
Yang, C., Chen, X., & Xiang, Y. 2018. Blockchain-Based Publicly Verifiable Data Deletion Scheme for Cloud Storage. Journal of Network and Computer Applications, 103: 185–93. doi.org/10.1016/j.jnca.2017.11.011.
Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., & Khamayseh, Y. 2017. Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms. In 2017 International Conference on Engineering and Technology (ICET), January:1–7. IEEE. doi.org/10.1109/ICEngTechnol.2017.8308215.
Yi, H. 2019. Securing Instant Messaging Based on Blockchain with Machine Learning. Safety Science, 120: 6–13. doi.org/10.1016/j.ssci.2019.06.025.
Zhang, M., Wang, S., Zhang, P., He, L., Li, X., & Zhou, S. 2019. Protecting Data Privacy for Permissioned Blockchains Using Identity-Based Encryption. In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 602–5. IEEE. doi.org/10.1109/ITNEC.2019.8729244.
Zhou, N., Wu, M., & Zhou, J. 2017. Volunteer Service Time Record System Based on Blockchain Technology. Proceedings of 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference, IAEAC, 610–13. doi.org/10.1109/IAEAC.2017.8054088.
DOI: https://doi.org/10.14203/j.baca.v42i1.643
Copyright (c) 2021 BACA: JURNAL DOKUMENTASI DAN INFORMASI
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.