Review Article

PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud

Table 3

Papers used in the survey.

Purpose of the algorithmNumber of sources and referencesRun time trend

Data security24 (64, 68, 70, 71,78, 80, 81, 82, 83, 84, 86, 87, 88, 89, 90, 112, 116, 118, 119, 120, 121, 123, 130, 134)Linear
Attack on cloud1 (65)Linear
Privacy and preservation1 (66)Linear
Security analysis1 (67)Linear
Data protection1 (69)Linear
Cloud security34 (72, 73, 74, 76, 77,79, 91, 93, 94, 95, 96, 97, 98, 100, 101, 102, 103, 104, 105, 108, 110, 111, 113, 114, 115, 117, 122, 124, 125, 128, 129, 133, 135, 136)Linear
Intrusion detection1 (75)Linear
Security, privacy and trust1 (85)Linear
Security and privacy5 (92, 99, 107, 126, 131, 132)Linear
Data privacy1 (106)Linear
Security and privacy2 (109, 127)Linear