Comparative study of cryptography for cloud computing for data security

被引:0
|
作者
Mathur P. [1 ]
Gupta A.K. [1 ]
Vashishtha P. [1 ]
机构
[1] Department of Computer Science and Engineering, Poornima Institute of Engineering & Technology, Jaipur
关键词
Client side encryption; Cloud computing; Cryptography; Data security; Elliptic curve cryptography; Hybrid en-cryption; Rijndael algorithm; SRNN;
D O I
10.2174/2666255813666190911114909
中图分类号
学科分类号
摘要
Background: Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. So the cloud computing techniques need security of information com-municated between the sending and receiving entities. Objective: The secure data storage disadvantage of Cloud computing can be resolve up to some ex-tent with the help of the implementation of the cryptographic algorithms during the storing and ac-cessing of the data from the cloud servers. Methods: In this paper we have compared four different recently implemented Cryptographic Algorithms which are Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique. Conclusion: Client Side Encryption Technique and Hybrid Encryption Technique are better than Modified RSA and Elliptic Curve Cryptography because Client Side Encryption Technique has an advantage that in this data is encrypted prior to upload the data on the cloud i.e. encryption at the client side which provides an additional layer of security to the data on the cloud. On the other hand, Hybrid Encryption Technique has an advantage that it uses the rapidity of the processing time of Symmetric Key Cryptography and robustness in key length of the Asymmetric Key Cryptography. © 2021 Bentham Science Publishers.
引用
收藏
页码:1508 / 1513
页数:5
相关论文
共 50 条
  • [1] Cryptography and Data Security in Cloud Computing
    Yan, Zheng
    Deng, Robert H.
    Varadharajan, Vijay
    INFORMATION SCIENCES, 2017, 387 : 53 - 55
  • [2] Cognitive cryptography for data security in cloud computing
    Ogiela, Urszula
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [3] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [4] A Novel Scheme for Data Security in Cloud Computing using Quantum Cryptography
    Sharma, Geeta
    Kalra, Sheetal
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [5] PSR: An Improvement of Lightweight Cryptography Algorithm for Data Security in Cloud Computing
    Chandra, P. Sri Ram
    Rao, p Syamala
    Naresh, K.
    Malladi, Ravisankar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (01) : 1053 - 1058
  • [6] A Study in Data Security in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    Majid, Mazlina Binti Abdul
    Khan, Nusrat Ullah
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 367 - 371
  • [7] A Hybrid Cryptography Algorithm for Cloud Computing Security
    Timothy, Divya Prathana
    Santra, Ajit Kumar
    2017 INTERNATIONAL CONFERENCE ON MICROELECTRONIC DEVICES, CIRCUITS AND SYSTEMS (ICMDCS), 2017,
  • [8] A Comparative Study of Trends in Security in Cloud Computing
    Khan, Abdul Muttalib
    Ahmad, Shish
    Haroon, Mohd.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 586 - 590
  • [9] A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    Khan, Atta Ur Rehman
    2013 IEEE SYMPOSIUM ON WIRELESS TECHNOLOGY & APPLICATIONS (ISWTA2013), 2013, : 62 - 67
  • [10] Enhancing Data and Privacy Security in Mobile Cloud Computing through Quantum Cryptography
    Han, Jiawei
    Liu, Yanheng
    Sun, Xin
    Song, Lijun
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 398 - 401