Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

被引:4
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
关键词
Cloud computing; cloud security; cryptography; image encryption; image storing; security algorithms analysis; DES;
D O I
10.1080/03772063.2021.1990141
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing uses a network of remote servers hosted on the Internet to store, manage, and process data. As the cloud is explicitly unsafe, from the time the cloud platform was utilized for storage many researchers and analysts have been trying to develop many encryption algorithms to provide excellent security on the data. The algorithms' weaknesses, performance and strength should be known to apply a suitable cryptography algorithm to an application. This paper evaluates the efficiency of the encryption techniques AES, DES, 3DES, Blowfish, RC4 and RSA on the basis of image data security and performance in the cloud environment. The algorithms have been subjected to different analytic tests such as differential cryptanalysis, statistical analysis, key sensitivity analysis, and performance analysis to analyses the efficiency of each algorithm for security and performance.
引用
收藏
页码:6053 / 6064
页数:12
相关论文
共 50 条
  • [11] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques
    Pardeshi, Suraj R.
    Pawar, Vikul J.
    Kharat, Kailash D.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515
  • [12] Cloud Security Algorithms
    Pansotra, Ashima
    Singh, Simar Preet
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (10): : 353 - 360
  • [13] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [14] An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms
    Njuki, Sam
    Zhang, Jianbiao
    Too, Edna C.
    Richard, Rimiru
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND SYSTEMS (ICACS 2018), 2018, : 14 - 20
  • [15] Review Of Some Cryptographic Algorithms In Cloud Computing
    Alharbi, Mawaddah Fouad
    Aldosari, Fahd
    Soh, Ben
    Alharbi, Nawaf Fouad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09): : 41 - 50
  • [16] An Advance Cryptographic Solutions in Cloud Computing Security
    Ul Abedin, Zain
    Guan, Zhitao
    Arif, Asad Ullah
    Anwar, Usman
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [17] Issues And Challenges of Data Security In A Cloud Computing Environment
    Sharma, Pradeep Kumar
    Kaushik, Prem Shankar
    Agarwal, Prerna
    Jain, Payal
    Agarwal, Shivangi
    Dixit, Kamlesh
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 560 - 566
  • [18] Big Data Security in Cloud Environment
    Reddy, Yenumula B.
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 100 - 106
  • [19] A Comparative Analysis on Cloud Data Security
    Varghese, Saira
    Vigila, S. Maria Celestin
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 495 - 498
  • [20] Analysis of Security Algorithms in Cloud Computing
    Agrawal, Tanvi
    Singh, S. K.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 106 - 108