Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

被引:4
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
关键词
Cloud computing; cloud security; cryptography; image encryption; image storing; security algorithms analysis; DES;
D O I
10.1080/03772063.2021.1990141
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing uses a network of remote servers hosted on the Internet to store, manage, and process data. As the cloud is explicitly unsafe, from the time the cloud platform was utilized for storage many researchers and analysts have been trying to develop many encryption algorithms to provide excellent security on the data. The algorithms' weaknesses, performance and strength should be known to apply a suitable cryptography algorithm to an application. This paper evaluates the efficiency of the encryption techniques AES, DES, 3DES, Blowfish, RC4 and RSA on the basis of image data security and performance in the cloud environment. The algorithms have been subjected to different analytic tests such as differential cryptanalysis, statistical analysis, key sensitivity analysis, and performance analysis to analyses the efficiency of each algorithm for security and performance.
引用
收藏
页码:6053 / 6064
页数:12
相关论文
共 50 条
  • [41] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)
  • [42] An Analysis on Data Accountability and Security in Cloud
    Hande, Shital A.
    Mane, Sunil B.
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), 2015, : 713 - 717
  • [43] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [44] A Survey on Cloud Data Security using Image Steganography
    Albalawi, Afrah
    Hamza, Nermin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 645 - 649
  • [45] Ensuring Data Governace and Enhancing Data Security in a Private Cloud Environment
    Monday, Happy N.
    Li, Jian P.
    Nneji, Grace U.
    Ukwuoma, Chiagoziem C.
    Agomuo, David
    Nneji, Richard I.
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1018 - 1024
  • [46] DATA LOSS PROTECTION AND DATA SECURITY USING AGENTS FOR CLOUD ENVIRONMENT
    Carolin, S. Petcy
    Somasundaram, M.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [48] A NEURAL DATA SECURITY MODEL: ENSURE HIGH CONFIDENTIALITY AND SECURITY IN CLOUD DATA STORAGE ENVIRONMENT
    Jegadeeswari, S.
    Dinadayalan, P.
    Gnanambigai, N.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 400 - 406
  • [49] Security Algorithms for Cloud Computing
    Bhardwaj, Akashdeep
    Subrahmanyam, G. V. B.
    Avasthi, Vinay
    Sastry, Hanumat
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 535 - 542
  • [50] Evaluation Framework for Security and Resource Consumption of Cryptographic Algorithms
    Duta, Cristina-Loredana
    Mocanu, Bogdan-Costel
    Vladescu, Florin-Alexandru
    Gheorghe, Laura
    Tapus, Nicolae
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2015, 17 (03): : 77 - 87