Cloud Computing Security by Integrating Classical Encryption

被引:1
作者
Goodarzi, Koorosh [1 ]
Karimi, Abbas [1 ]
机构
[1] Islamic Azad Univ, Arak Branch, Fac Engn, Dept Comp Engn, Markazi, Iran
来源
MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013) | 2014年 / 42卷
关键词
cryptographic algorithms; cloud computing; classical and modern cryptographic algorithms;
D O I
10.1016/j.procs.2014.11.069
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud calculation provides sharing of the spread sources and the services related to the organizations or websites users. As cloud computing of distributed resource is shared in an open environment, the security is the biggest problem in software development. On one hand user controls data and process on his own computer and on the other hand, data services provided by the company and the vendor are kept in the cloud so that the user does not know where to store the data and has no control over it. In this paper, we try a hybrid methodology of modern and classic cryptographic algorithms for providing data security in a cloud environment. (C) 2014 The Authors. Published by Elsevier B.V.
引用
收藏
页码:320 / 326
页数:7
相关论文
共 50 条
[21]   Ensuring Data Storage Security in Cloud. Computing Based on Hybrid Encryption Schemes [J].
Sarkar, Mrinal Kanti ;
Kumar, Sanjay .
2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, :320-325
[22]   Federated Cloud Computing Security using Forward-Secure Broadcast Encryption HIBE [J].
Rekaby, Fayza ;
Abd El-Aziz, A. A. ;
Mahmood, Mahmood A. ;
Hefny, Hesham A. .
2015 11TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2015, :13-18
[23]   Query based computations on encrypted data through homomorphic encryption in cloud computing security [J].
Biksham, V. ;
Vasumathi, D. .
2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, :3820-3825
[24]   Security Analysis of Homomorphic Encryption Scheme for Cloud Computing: Known-Plaintext Attack [J].
Babenko, Mikhail ;
Chervyakov, Nikolay ;
Radchenko, Gleb ;
Tchernykh, Andrei ;
Navaux, Philippe O. A. ;
Kucherov, Nikolay ;
Deryabin, Maxim ;
Svyatkin, Viktor .
PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, :270-274
[25]   Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing [J].
Shabbir, Maryam ;
Shabbir, Ayesha ;
Iwendi, Celestine ;
Javed, Abdul Rehman ;
Rizwan, Muhammad ;
Herencsar, Norbert ;
Lin, Jerry Chun-Wei .
IEEE ACCESS, 2021, 9 :8820-8834
[26]   An improved attribute-based encryption technique towards the data security in cloud computing [J].
Namasudra, Suyel .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (03)
[27]   Cloud computing and cloud security in China [J].
Zhang, Shaohe ;
Jiang, Cuenyun ;
Wang, Ruxin .
ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
[28]   A Survey of Cloud Computing and Cloud Security [J].
Sui, Xin ;
Sui, Yi .
PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 :284-287
[29]   Cloud Computing: Cloud Security to Trusted Cloud [J].
Wu Jiyi ;
Shen Qianli ;
Zhang Jianlin ;
Xie Qi .
NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 :596-600
[30]   Hybrid encryption algorithms in cloud computing [J].
Guo, Ping ;
Su, Liping ;
Ning, Lijiang ;
Dan, Guangxiang .
Information Technology Journal, 2013, 12 (14) :3015-3019