Security Algorithms for Cloud Based Applications

被引:0
|
作者
Shaheen, Bushra [1 ]
Siddiqui, Farheen [1 ]
机构
[1] Jamia Hamdard, SEST, Dept CSE, New Delhi, India
来源
SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019 | 2020年 / 39卷
关键词
Cloud computing; Data security; Encryption algorithm; AES; DES; RSA; Public key; Private key;
D O I
10.1007/978-3-030-34515-0_60
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of cloud computing provides various scalable resources and dynamic capacity of storage which performs operations on the internet. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in accessibility of data. Data protection is also one of the major concern of cloud computing and in order to provide the security to it's users, cloud computing uses different cryptographic encryption algorithm. The main concern of this paper is to analyze which encryption algorithm will be most efficient and convenient to be used in cloud computing to secure data as well as less time consuming algorithm. Analysis have been done on different criteria like block size, key length, security and speed, encryption flow chart and decryption flow chart.
引用
收藏
页码:582 / 588
页数:7
相关论文
共 50 条
  • [1] Cloud Security Algorithms
    Pansotra, Ashima
    Singh, Simar Preet
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (10): : 353 - 360
  • [2] Security Algorithms for Cloud Computing
    Bhardwaj, Akashdeep
    Subrahmanyam, G. V. B.
    Avasthi, Vinay
    Sastry, Hanumat
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 535 - 542
  • [3] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [4] Comparative Analysis on the Performance of Selected Security Algorithms in Cloud Computing
    Cordova, Ronald S.
    Maata, Rolou Lyn R.
    Halibas, Alrence S.
    Al-Azawi, Rula
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, : 274 - 277
  • [5] Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
    Thabit, Fursan
    Can, Ozgu
    Wani, Rizwan Uz Zaman
    Qasem, Mohammed Ali
    Thorat, S. B.
    Alkhzaimi, Hoda A. A.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [6] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY
    Vennela, G. Sai
    Varun, N. Venkata
    Neelima, N.
    Priya, L. Sai
    Yeswanth, J.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
  • [7] A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services
    Khanezaei, Nasrin
    Hanapi, Zurina Mohd
    2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014), 2014, : 58 - 62
  • [8] Security information transmission algorithms for IoT based on cloud computing
    Ding Li
    Wang Zhongsheng
    Wang Xiaodong
    Wu Dong
    COMPUTER COMMUNICATIONS, 2020, 155 : 32 - 39
  • [9] Data Storage Security Algorithms for Multi Cloud Environment
    Ashalatha, R.
    Agarkhed, Jayashree
    Patil, Siddarama
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 686 - 690
  • [10] Analysis of Security Algorithms in Cloud Computing
    Agrawal, Tanvi
    Singh, S. K.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 106 - 108