Hybrid encryption algorithms in cloud computing

被引:2
作者
Guo, Ping [1 ]
Su, Liping [1 ]
Ning, Lijiang [1 ]
Dan, Guangxiang [2 ]
机构
[1] College of Computer Science, Chongqing University, Chongqing
[2] Bank of Chongqing, Chongqing
关键词
Cloud computing; Data security; Encryption algorithm; Hybrid encryption;
D O I
10.3923/itj.2013.3015.3019
中图分类号
学科分类号
摘要
The security issues of user privacy and data have become one of the most important factors in cloud computing. In this paper we focus on data encryption and study how to improve the security of data in the cloud through data encryption. Combining the feature of traditional encryption algorithms and the character of cloud platform, we design three hybrid encryption algorithms 3DES-AES, TDAES and TDAESalt. Experiment results show that the designed algorithms have strong encryption strength and can generate ciphertexts quickly in cloud platform. © 2013 Asian Network for Scientific Information.
引用
收藏
页码:3015 / 3019
页数:4
相关论文
共 11 条
  • [1] Adya A., Bolosky W.J., Castro M., Cermak G., Cermak G., Et al., Farsite: Federated, available and reliable storage for an incompletely trusted environment, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 36, pp. 1-14, (2002)
  • [2] Bhagwan R., Tati K., Cheng Y.C., Savage S., Voelker G.M., Total recall: System support for automated availability management, Proceedings of the 1 St International Conference on Symposium on Networked Systems Design and Implementation, 1, pp. 25-25, (2004)
  • [3] Daemen J., Rijmen V., The Design of Rijndael: AES-The Advanced Encryption Standard, (2002)
  • [4] Dean J., Ghemawat S., MapReduce: Simplified data processing on large clusters, Commun. ACM, 51, pp. 107-113, (2008)
  • [5] Ghemawat S., Gobioff H., Leung S., The google file system, ACM SIGOPS Operat. Syst. Rev., 37, pp. 29-43, (2003)
  • [6] Hubbard D., Sutton M., Top Threats to Cloud Computing VI.0, (2010)
  • [7] Kahate A., Cryptography and Network Security, (2005)
  • [8] Kallahalla M., Riedel E., Swaminathan R., Wang Q., Fu K., Plutus: Scalable secure file sharing on untrusted storage, Proceedings of the 2nd Conference on File and Storage Technologies, pp. 29-42, (2003)
  • [9] Kallahalla M., Riedel E., Swaminathan R., Wang Q., Fu K., Plutus: Scalable secure file sharing on untrusted storage, Proceedings of the National Spatial Data Infrastructure, 3, pp. 29-42, (2004)
  • [10] Schneier B., Applied Cryptography: Protocols, Algorithm and Source Code in C, (2007)