Research Article
Secure Data Encryption for Cloud-Based Human Care Services
Table 7
Comparison evaluation between previous works and the proposed method.
| Method | Encryption | Optimized implementation | Optimized for big data |
| Arunkumar et al. [34] | AES | X | X | Kumar et al. [35] | AES, DES, Blowfish | X | X | Zhang et al. [36] | Searchable encryption | X | X | Zhao et al. [40] | Attribute-based encryption | X | X | Proposed method | Simeck | O | O |
|
|