International Journal of Forensic Software Engineering
These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.
Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.
Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.
Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer
Latest issue contents as RSS feed which provide timely updates of tables of contents, newly published articles and calls for papers.
International Journal of Forensic Software Engineering (1 paper in press)
Regular Issues
CloudJS file encryption algorithm for cloud environment by Sara Dharadhar, Rhea Gupta, Prathamesh Churi Abstract: Cloud computing is an extremely popular technology in todays world and its popularity arises from its ability to store, process, manage, and retrieve data from anywhere at any time. Along with its many advantages, security and privacy have proven to be a major setback for this technology. Security concerns of cloud data include its protection from data breaches, hijacking of accounts, insider threat, malware injection, abuse of cloud
services, DOS attacks, insufficient due diligence, insecure APIs, shared vulnerabilities, and data loss. Encryption algorithms that address these concerns have been reviewed along with the jumbling salting algorithm and its applications. The main goal of this paper is to propose a framework for cloud encryption using the CloudJS algorithm and to discuss the results (in standalone machine) for the same. Keywords: cloud computing; cloud security; data encryption; jumbling salting algorithm. DOI: 10.1504/IJFSE.2020.10034787