Security Algorithms for Cloud Based Applications

被引:0
|
作者
Shaheen, Bushra [1 ]
Siddiqui, Farheen [1 ]
机构
[1] Jamia Hamdard, SEST, Dept CSE, New Delhi, India
来源
SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019 | 2020年 / 39卷
关键词
Cloud computing; Data security; Encryption algorithm; AES; DES; RSA; Public key; Private key;
D O I
10.1007/978-3-030-34515-0_60
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of cloud computing provides various scalable resources and dynamic capacity of storage which performs operations on the internet. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in accessibility of data. Data protection is also one of the major concern of cloud computing and in order to provide the security to it's users, cloud computing uses different cryptographic encryption algorithm. The main concern of this paper is to analyze which encryption algorithm will be most efficient and convenient to be used in cloud computing to secure data as well as less time consuming algorithm. Analysis have been done on different criteria like block size, key length, security and speed, encryption flow chart and decryption flow chart.
引用
收藏
页码:582 / 588
页数:7
相关论文
共 50 条
  • [31] A Comprehensive Evaluation of Cryptographic Algorithms in Cloud Computing
    Kulshrestha, Vartika
    Verma, Seema
    Challa, C. Rama K.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 32 - 36
  • [32] Security Attacks and Countermeasures on Cloud Assisted IoT Applications
    Alsaidi, Asma
    Kausar, Firdous
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, : 213 - 217
  • [33] Security Risk Optimization for Multi-cloud Applications
    Lovrencic, Rudolf
    Jakobovic, Domagoj
    Skvorc, Dejan
    Gros, Stjepan
    APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2020, 2020, 12104 : 659 - 669
  • [34] A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
    Nafi, Kawser Wazed
    Kar, Tonny Shekha
    Hoque, Sayed Anisul
    Hashem, M. M. A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 181 - 186
  • [35] A Platform for Security Monitoring of Multi-cloud Applications
    Carvallo, Pamela
    Cavalli, Ana R.
    Mallouli, Wissam
    PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2017, 2018, 10742 : 59 - 71
  • [36] Online Analysis of Security Risks in Elastic Cloud Applications
    Naskos, Athanasios
    Gounaris, Anastasios
    Mouratidis, Haralambos
    Katsaros, Panagiotis
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 26 - 33
  • [37] Improving the Security of Cloud-based Medical Image Storage
    Marwan, Mbarek
    AlShahwan, Feda
    Sifou, Fatima
    Kartit, Ali
    Ouahmane, Hassan
    ENGINEERING LETTERS, 2019, 27 (01) : 175 - 193
  • [38] A Security Framework for Cloud Data Storage(CDS) Based on Agent
    Arki, Oussama
    Zitouni, Abdelhafid
    APPLIED COMPUTATIONAL INTELLIGENCE AND MATHEMATICAL METHODS: COMPUTATIONAL METHODS IN SYSTEMS AND SOFTWARE 2017, VOL. 2, 2018, 662 : 62 - 73
  • [39] Security Research on Cloud-Based Logistics Service Platform
    Sun, Fuquan
    Liu, Chao
    Cheng, Xu
    Zhang, Dawei
    INTERNET OF THINGS-BK, 2012, 312 : 394 - 400
  • [40] TTP based Vivid Protocol Design for Authentication and Security for Cloud
    Bhardwaj, Akhilesh Kumar
    Mahajan, Rajiv
    Surender
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3275 - 3278