SECURITY ALGORITHMS FOR WEB APPLICATIONS: A SYSTEMATIC MAPPING
Keywords:
Algorithms, confidentiality, integrity, availability, web securityAbstract
At present the number of network users has been progressively increasing; as a consequence, the treats and vulnerabilities faced by the system have also increased considerably. Putting the confidentiality, integrity and availability of the handled data at risk. The implementation of algorithms protection in the development of websites is crucial to guarantee the security and integrity of information and to face possible computer treats. The deductive method, observation and exploratory research will be used for the analysis of primary information. As a result, a systematic mapping of the most used security algorithms in web applications is presented. The impact of this research could have a direct or indirect effect for all web applications, which present security problems.
Keywords: Algorithms, confidentiality, integrity, availability, web security.
References
Abhishek, G., & Asha, A. (2020). Development of “RSA” Encryption Algorithm for Secure Data Transmission. Research Journal of Computer and Information Technology Sciences, 8(1), 9-12, e-ISSN: 2320-6527. https://doi.org/http://www.isca.me/COM_IT_SCI/Archive/v8/i1/2.ISCA-RJCITS-2019-009.pdf
Abood, O., & Guirguis, S. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications, 8(7), 495-516, e-ISSN: 2250-3153. https://doi.org/http://dx.doi.org/10.29322/IJSRP.8.7.2018.p7978
Ajitha, P. (2021). Responsive Design in Web Development with Security Using Optimization Algorithms. International Journal of Research in Engineering and Science, 9(1), 16-22, e-ISSN: 2320-9364. https://doi.org/https://www.ijres.org/papers/Volume-9/Issue-1/2/C0901021622.pdf
Avelino, M. (2021). Buenos algoritmos con malas implementaciones. Revista Española de Ciberseguridad, Privacidad y Digitalización, 19-24. https://doi.org/http://www.recsi2020.udl.cat/static/site/files/Avelino-XVI-RECSI.pdf
Chavan, S., & Tamane, S. (2020). Enhancement in Cloud Security for Web Application Attacks. IEEE, 91-95. https://doi.org/10.1109/ICSIDEMPC49020.2020.9299629
Chen, C., Zhong, J., & Chen, W. (2021). Machine Learning-based web security intrusion detection system. IEEE, 173-177. https://doi.org/10.1109/IAECST54258.2021.9695557
Gitanjali, A., Kadlag, & Dhotre, P. S. (2020). Detection and prevention of data modification attack based on MD5 algorithm. International Journal of Current Engineering and Technology, 7(8), 1005-1008, e-ISSN: 2277-4106. https://doi.org/https://inpressco.com/wp-content/uploads/2021/02/Paper2101005-1008.pdf
Gondaliya, J., Savani , S., Dhaduvai, V. S., & Hossain, G. (2018). Hybrid Security RSA Algorithm in Application of Web Service. IEEE, 149-152. https://doi.org/10.1109/ICDIS.2018.00032
Naidu, S., Krishna, R., & Kumari, G. (2019). A Trusted New Method for Authentication and Security for Web Applications in Cloud Using RSA Algorithm. International Journal of Emerging Technologies and Innovative Research, 6(4), 1-8, e-ISSN: 2349-5162. https://doi.org/https://ssrn.com/abstract=3708131
Pittalia, P. (2019). A Comparative Study of Hash Algorithms in Cryptography. International Journal of Computer Science and Mobile Computing, 8(6), 147-152, e-ISSN: 2320-088X. https://doi.org/https://ijcsmc.com/docs/papers/June2019/V8I6201928.pdf
Sa’idu , S., Taneja, P., & Kalta, S. (2022). A Comparative Analysis of Cryptographic Algorithms: AES & RSA and Hybrid Algorithmfor Encryption and Decryption. International Journal of Innovative Science and Research Technology, 7, 1725-1732, e-ISSN: 2456-2165. https://doi.org/https://ijisrt.com/assets/upload/files/IJISRT22AUG773.pdf
Sholikhatin, S., Kuncoro, A., Munawaroh, A., & Gilang , S. (2022). Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security. Edu Komputika Journal, 9(1), 60-67, e-ISSN: 2252-6811. https://doi.org/https://doi.org/10.15294/edukomputika.v9i1.57389
Simarmata, J., Limbong, T., Misalina , G., Damanik, R., Padli Nasution, M. I., Halim Hasugian, A., . . . Sinambela, M. (2018). Implementation of AES Algorithm for Information Security of Web-Based Application. International Journal of Engineering & Technology, 7(4), 318-320. https://doi.org/https://doi.org/10.14419/ijet.v7i3.4.20124
Singh, P., Tripathi, V., Gangodkar, D., & Bordolo, D. (2021). A DES, AES, DSS, and RSA-Based Security System for Protecting Sensitive Information During Communication and Providing Fast, Reliable File Identification. Webology, 18(5), 3218-3227, e-ISSN: 1735-188X. https://doi.org/https://www.webology.org/data-cms/articles/20221014114355amPaper%2057.pdf
Turnip, T. N., Aruan, H., Siagian, A. L., & Siagian, L. (2022). Web Browser Extension Development of Structured Query Language Injection Vulnerability Detection Using Long Short-Term Memory Algorithm. IEEE, 1-5. doi: https://doi.org/10.1109/ICOSNIKOM56551.2022.10034905
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Scientific Journal INGENIAR: Engineering, Technology and Research

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.