Performance Analysis of Encryption Algorithms with Pat-Fish for Cloud Storage Security

被引:0
作者
Usha, M. [1 ]
Prabhu, A. [2 ]
机构
[1] Sona Coll Technol, Salem, Tamil Nadu, India
[2] PSG Inst Technol & Appl Res, Coimbatore, Tamil Nadu, India
来源
MOBILE AND WIRELESS TECHNOLOGY 2018, ICMWT 2018 | 2019年 / 513卷
关键词
Encryption; Decryption; DES; Blowfish; RSA; Pat-Fish; Pattern matching algorithm;
D O I
10.1007/978-981-13-1059-1_11
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the era of the Cloud, a remote user connected from anywhere, anytime is provided with any form of access to the storage services. Internet of things is growing rapidly in all aspects and Cloud storage has become an essential aspect in the day to day life. Data Science and Big data analytics, and other technologies use the smart devices like personal Laptop, tablet and smartphone and enterprises are interested to store data and the transactions in Cloud data centres. However, cloud storage needs a secured transaction and authentication system. Cloud service providers need to provide high security at their storage level. Our approach combines Blowfish algorithm and Pattern matching to secure the data in cloud data storage. Pattern matching algorithm is the best algorithm in terms of time complexity and space complexity. Blowfish algorithm is a 16-round Fiestal algorithm, which is used to encrypt and decrypt the input files. This paper evaluates the hybrid Pat-Fish algorithm with DES, RSA, and Blowfish methods on text files. The standard evaluation parameters namely encryption time and decryption time are taken for performance comparison. This Pat-Fish approach yields less time for encryption and decryption compared to DES, RSA and Blowfish algorithms. This method is suitable for cloud storage to store the client data with security.
引用
收藏
页码:111 / 120
页数:10
相关论文
共 15 条
  • [1] Aazam M, 2014, P 11 IEEE INT BHUR C, P14
  • [2] AlTamimi Abdel-Karim, 2008, PERFORMANCE ANAL DAT
  • [3] [Anonymous], 2013, INT J COMPUT SCI ISS
  • [4] Data Encryption Standard, 1999, FEDERAL INFORM PROCE, V46
  • [5] Kavitha P, 2016, J THEOR APP INFO TEC, V62, P646
  • [6] Designing and Performance Analysis of a Proposed Symmetric Cryptography Algorithm
    Mandal, Bijoy Kumar
    Bhattacharyya, Debnath
    Bandyopadhyay, Samir Kumar
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 453 - 461
  • [7] A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
    Patil, Priyadarshini
    Narayankar, Prashant
    Narayan, D. G.
    Meena, S. M.
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 617 - 624
  • [8] Prabhu A, 2015, INT J APPL ENG RES, V10, P28021
  • [9] Prabhu A, 2018, NAT C EM TRENDS SIGN, P38
  • [10] Prabhu A, INT J BUSINESS INTEL, DOI [10.1504/ijbidm.2018.10007299, DOI 10.1504/IJBIDM.2018.10007299]