Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud

被引:0
|
作者
Chennam, Krishna Keerthi [1 ]
Muddana, Lakshmi [2 ]
Aluvalu, Rajani Kanth [1 ]
机构
[1] GITAM Univ, Hyderabad, Andhra Pradesh, India
[2] GITAM Univ, IT Dept, Hyderabad, Andhra Pradesh, India
来源
2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT) | 2017年
关键词
cloudcomputing; access control; multistage encryption; AES; DES; RSA; IDEA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is an emerging technology has grown a lot for virtualization and provides many services over the internet such as software as a service, platform as a service, infrastructure as a service and many more services which reduce the cost expenses and operating expenses. Now by using these services, data can store online in the cloud, then automatically a security concern will arise about data. Many protection techniques have been proposed till now. The best options available is encrypting the data before storing in third party cloud database and again decrypt the data after retrieving from the cloud. We introduce a more economical and robust encryption technique which allows a third-party cloud server to shield user data more expeditiously.
引用
收藏
页码:2030 / 2033
页数:4
相关论文
共 50 条
  • [31] Securing Data in Image Using Advanced Encryption Standard
    Chavan, Puja
    Pagar, Aditya
    Pote, Sanket
    Fulsundar, Avdhoot
    Ghante, Piyush
    Mane, Phinehas
    Sonawane, Raj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 411 - 419
  • [32] Analysis of Classical Encryption Techniques in Cloud Computing
    Muhammad Yasir Shabir
    Asif Iqbal
    Zahid Mahmood
    Ata Ullah Ghafoor
    Tsinghua Science and Technology, 2016, 21 (01) : 102 - 113
  • [33] Applying Encryption Algorithm for Data Security in Cloud Storage
    Kartit, Zaid
    Azougaghe, Ali
    Kamal Idrissi, H.
    El Marraki, M.
    Hedabou, M.
    Belkasmi, M.
    Kartit, A.
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 141 - 154
  • [34] Evaluating Performance of Symmetric Encryption Algorithms
    Raigoza, Jaime
    Jituri, Kapil
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1378 - +
  • [35] An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment
    N. Geetha
    K. Mahesh
    Wireless Personal Communications, 2022, 123 : 1553 - 1571
  • [36] Performance analysis of dct based lossy compression method with symmetrical encryption algorithms
    Gupta N.
    Vijay R.
    Gupta H.K.
    EAI Endorsed Transactions on Energy Web, 2020, 7 (28)
  • [37] An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment
    Geetha, N.
    Mahesh, K.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (02) : 1553 - 1571
  • [38] Accelerated Encryption Algorithms for Secure Storage and Processing in the Cloud
    Badii, Atta
    Faulkner, Ryan
    Raval, Rajkumar
    Glackin, Cornelius
    Chollet, Gerard
    2017 3RD INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2017, : 586 - 591
  • [39] Usage of the hybrid encryption in a cloud instant messages exchange system
    Kvyetnyy, Roman N.
    Romanyuk, Olexander N.
    Titarchuk, Evgenii O.
    Gromaszek, Konrad
    Mussabekov, Nazarbek
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2016, 2016, 10031
  • [40] Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud
    Boomija, M. D.
    Raja, S. V. Kasmir
    SOFT COMPUTING, 2023, 27 (01) : 559 - 568