SECURITY ALGORITHMS FOR WEB APPLICATIONS: A SYSTEMATIC MAPPING

Authors

  • Del Pozo-Durango Rodrigo Humberto Universidad Estatal de Bolívar. Guaranda, Ecuador.
  • Chariguaman-Asitumbay Henrry Wilfrido Universidad Estatal de Bolívar. Guaranda, Ecuador.
  • Quicaliquin-Rochina Alex Joel Universidad Estatal de Bolívar. Guaranda, Ecuador.
  • Orizaga-Trejo José Antonio Universidad de Guadalajara. Guadalajara, México.

Keywords:

Algorithms, confidentiality, integrity, availability, web security

Abstract

At present the number of network users has been progressively increasing; as a consequence, the treats and vulnerabilities faced by the system have also increased considerably. Putting the confidentiality, integrity and availability of the handled data at risk. The implementation of algorithms protection in the development of websites is crucial to guarantee the security and integrity of information and to face possible computer treats. The deductive method, observation and exploratory research will be used for the analysis of primary information. As a result, a systematic mapping of the most used security algorithms in web applications is presented. The impact of this research could have a direct or indirect effect for all web applications, which present security problems.

Keywords: Algorithms, confidentiality, integrity, availability, web security.

References

Abhishek, G., & Asha, A. (2020). Development of “RSA” Encryption Algorithm for Secure Data Transmission. Research Journal of Computer and Information Technology Sciences, 8(1), 9-12, e-ISSN: 2320-6527. https://doi.org/http://www.isca.me/COM_IT_SCI/Archive/v8/i1/2.ISCA-RJCITS-2019-009.pdf

Abood, O., & Guirguis, S. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications, 8(7), 495-516, e-ISSN: 2250-3153. https://doi.org/http://dx.doi.org/10.29322/IJSRP.8.7.2018.p7978

Ajitha, P. (2021). Responsive Design in Web Development with Security Using Optimization Algorithms. International Journal of Research in Engineering and Science, 9(1), 16-22, e-ISSN: 2320-9364. https://doi.org/https://www.ijres.org/papers/Volume-9/Issue-1/2/C0901021622.pdf

Avelino, M. (2021). Buenos algoritmos con malas implementaciones. Revista Española de Ciberseguridad, Privacidad y Digitalización, 19-24. https://doi.org/http://www.recsi2020.udl.cat/static/site/files/Avelino-XVI-RECSI.pdf

Chavan, S., & Tamane, S. (2020). Enhancement in Cloud Security for Web Application Attacks. IEEE, 91-95. https://doi.org/10.1109/ICSIDEMPC49020.2020.9299629

Chen, C., Zhong, J., & Chen, W. (2021). Machine Learning-based web security intrusion detection system. IEEE, 173-177. https://doi.org/10.1109/IAECST54258.2021.9695557

Gitanjali, A., Kadlag, & Dhotre, P. S. (2020). Detection and prevention of data modification attack based on MD5 algorithm. International Journal of Current Engineering and Technology, 7(8), 1005-1008, e-ISSN: 2277-4106. https://doi.org/https://inpressco.com/wp-content/uploads/2021/02/Paper2101005-1008.pdf

Gondaliya, J., Savani , S., Dhaduvai, V. S., & Hossain, G. (2018). Hybrid Security RSA Algorithm in Application of Web Service. IEEE, 149-152. https://doi.org/10.1109/ICDIS.2018.00032

Naidu, S., Krishna, R., & Kumari, G. (2019). A Trusted New Method for Authentication and Security for Web Applications in Cloud Using RSA Algorithm. International Journal of Emerging Technologies and Innovative Research, 6(4), 1-8, e-ISSN: 2349-5162. https://doi.org/https://ssrn.com/abstract=3708131

Pittalia, P. (2019). A Comparative Study of Hash Algorithms in Cryptography. International Journal of Computer Science and Mobile Computing, 8(6), 147-152, e-ISSN: 2320-088X. https://doi.org/https://ijcsmc.com/docs/papers/June2019/V8I6201928.pdf

Sa’idu , S., Taneja, P., & Kalta, S. (2022). A Comparative Analysis of Cryptographic Algorithms: AES & RSA and Hybrid Algorithmfor Encryption and Decryption. International Journal of Innovative Science and Research Technology, 7, 1725-1732, e-ISSN: 2456-2165. https://doi.org/https://ijisrt.com/assets/upload/files/IJISRT22AUG773.pdf

Sholikhatin, S., Kuncoro, A., Munawaroh, A., & Gilang , S. (2022). Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security. Edu Komputika Journal, 9(1), 60-67, e-ISSN: 2252-6811. https://doi.org/https://doi.org/10.15294/edukomputika.v9i1.57389

Simarmata, J., Limbong, T., Misalina , G., Damanik, R., Padli Nasution, M. I., Halim Hasugian, A., . . . Sinambela, M. (2018). Implementation of AES Algorithm for Information Security of Web-Based Application. International Journal of Engineering & Technology, 7(4), 318-320. https://doi.org/https://doi.org/10.14419/ijet.v7i3.4.20124

Singh, P., Tripathi, V., Gangodkar, D., & Bordolo, D. (2021). A DES, AES, DSS, and RSA-Based Security System for Protecting Sensitive Information During Communication and Providing Fast, Reliable File Identification. Webology, 18(5), 3218-3227, e-ISSN: 1735-188X. https://doi.org/https://www.webology.org/data-cms/articles/20221014114355amPaper%2057.pdf

Turnip, T. N., Aruan, H., Siagian, A. L., & Siagian, L. (2022). Web Browser Extension Development of Structured Query Language Injection Vulnerability Detection Using Long Short-Term Memory Algorithm. IEEE, 1-5. doi: https://doi.org/10.1109/ICOSNIKOM56551.2022.10034905

Published

2023-06-20

How to Cite

Del Pozo-Durango, R. H., Chariguaman-Asitumbay, H. W., Quicaliquin-Rochina, A. J., & Orizaga-Trejo, J. A. (2023). SECURITY ALGORITHMS FOR WEB APPLICATIONS: A SYSTEMATIC MAPPING. Scientific Journal INGENIAR: Engineering, Technology and Research, 6(11 Ed. esp.), 2-11. Retrieved from https://journalingeniar.org/index.php/ingeniar/article/view/124