Security Algorithms for Cloud Based Applications

被引:0
|
作者
Shaheen, Bushra [1 ]
Siddiqui, Farheen [1 ]
机构
[1] Jamia Hamdard, SEST, Dept CSE, New Delhi, India
来源
SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019 | 2020年 / 39卷
关键词
Cloud computing; Data security; Encryption algorithm; AES; DES; RSA; Public key; Private key;
D O I
10.1007/978-3-030-34515-0_60
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of cloud computing provides various scalable resources and dynamic capacity of storage which performs operations on the internet. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in accessibility of data. Data protection is also one of the major concern of cloud computing and in order to provide the security to it's users, cloud computing uses different cryptographic encryption algorithm. The main concern of this paper is to analyze which encryption algorithm will be most efficient and convenient to be used in cloud computing to secure data as well as less time consuming algorithm. Analysis have been done on different criteria like block size, key length, security and speed, encryption flow chart and decryption flow chart.
引用
收藏
页码:582 / 588
页数:7
相关论文
共 50 条
  • [41] Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud
    Chennam, Krishna Keerthi
    Muddana, Lakshmi
    Aluvalu, Rajani Kanth
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 2030 - 2033
  • [42] Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
    Ari, Ado Adamou Abba
    Ngangmo, Olga Kengni
    Titouna, Chafiq
    Thiare, Ousmane
    Kolyang
    Mohamadou, Alidou
    Gueroui, Abdelhak Mourad
    APPLIED COMPUTING AND INFORMATICS, 2024, 20 (1/2) : 119 - 141
  • [43] Cloud computing security based on OWASP
    Alobaidi, AbdulAzeez R.
    Nuimi, Zinah N.
    5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022), 2022, : 22 - 28
  • [44] Cloud Security based on the Homomorphic Encryption
    Al-Sit, Waleed T.
    Al-Zoubi, Hani
    Al-Jubouri, Qussay
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 300 - 307
  • [45] Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms
    Caron, Eddy
    Le, Anh Dung
    Lefray, Arnaud
    Toinard, Christian
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 125 - 131
  • [46] Applying Encryption Algorithm for Data Security in Cloud Storage
    Kartit, Zaid
    Azougaghe, Ali
    Kamal Idrissi, H.
    El Marraki, M.
    Hedabou, M.
    Belkasmi, M.
    Kartit, A.
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 141 - 154
  • [47] Simulation of SLA-based VM-scaling algorithms for cloud-distributed applications
    Antonescu, Alexandru-Florian
    Braun, Torsten
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 54 : 260 - 273
  • [48] Security Outlook for Cloud Computing: A Proposed Architectural-Based Security Classification for Cloud Computing
    Khari, Manju
    Gupta, Sana
    Kumar, Manoj
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2153 - 2158
  • [49] ASIC-Oriented Comparative Review of Hardware Security Algorithms for Internet of Things Applications
    Bahnasawi, Mohamed A.
    Ibrahim, Khalid
    Mohamed, Ahmed
    Mohamed, Mohamed Khalifa
    Moustafa, Ahmed
    Abdelmonem, Kareem
    Ismail, Yehea
    Mostafa, Hassan
    2016 28TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM 2016), 2016, : 285 - 288
  • [50] Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing
    Chen Jinyin
    Yang Dongyong
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 : 149 - 153