Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

被引:4
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
关键词
Cloud computing; cloud security; cryptography; image encryption; image storing; security algorithms analysis; DES;
D O I
10.1080/03772063.2021.1990141
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing uses a network of remote servers hosted on the Internet to store, manage, and process data. As the cloud is explicitly unsafe, from the time the cloud platform was utilized for storage many researchers and analysts have been trying to develop many encryption algorithms to provide excellent security on the data. The algorithms' weaknesses, performance and strength should be known to apply a suitable cryptography algorithm to an application. This paper evaluates the efficiency of the encryption techniques AES, DES, 3DES, Blowfish, RC4 and RSA on the basis of image data security and performance in the cloud environment. The algorithms have been subjected to different analytic tests such as differential cryptanalysis, statistical analysis, key sensitivity analysis, and performance analysis to analyses the efficiency of each algorithm for security and performance.
引用
收藏
页码:6053 / 6064
页数:12
相关论文
共 50 条
  • [31] A Quantitative Analysis of Cloud Users' Satisfaction and Data Security in Cloud Models
    Zardari, Munwar Ali
    Jung, Low Tang
    Zakaria, Nordin
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 42 - 47
  • [32] A cross encryption scheme for data security storage in cloud computing environment
    Kang, Haiyan
    Deng, Jie
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) : 1 - 10
  • [33] A Comprehensive Evaluation of Cryptographic Algorithms in Cloud Computing
    Kulshrestha, Vartika
    Verma, Seema
    Challa, C. Rama K.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 32 - 36
  • [34] Security Algorithms for Cloud Based Applications
    Shaheen, Bushra
    Siddiqui, Farheen
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 582 - 588
  • [35] A Review of Cloud Security Based on Cryptographic Mechanisms
    Abd, Sura Khalil
    Al-Haddad, S. A. R.
    Hashim, Fazirulhisyam
    Abdullah, Azizol
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 106 - 111
  • [36] Safe: Cryptographic Algorithms and Security Principles Gamification
    Al Kaabi, Latifa
    Al Ketbi, Wadha
    Al Khoori, Aysha
    Al Shamsi, Maitha
    Alrabaee, Saed
    PROCEEDINGS OF THE 2022 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2022), 2022, : 1169 - 1178
  • [37] Big Data Processing Security Issues in Cloud Environment
    Bouleghlimat, Imene
    Hacini, Salima
    ADVANCES IN COMPUTING SYSTEMS AND APPLICATIONS, 2019, 50 : 27 - 36
  • [38] Comparative Analysis of Scheduling Algorithms in Cloud Environment
    Rajan, Sanju
    Anand, P. M. Rubesh
    Persis, D. Jinil
    Sankaran, K. Sakthidasan
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 953 - 956
  • [39] A novel model to enhance the data security in cloud environment
    Verma, Garima
    Kanrar, Soumen
    MULTIAGENT AND GRID SYSTEMS, 2022, 18 (01) : 45 - 63
  • [40] Permanent Participatory Data Security in a Cloud Computing Environment
    El Ahrache, Sara Ibn
    Badir, Hassan
    Ghodous, Parisa
    Sbihi, Abderrahmane
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 320 - 324