Secure Data Storage in Cloud using Cryptographic Algorithms

被引:0
作者
Kodumru, Nagasai Lohitha [1 ]
Supriya, M. [1 ]
机构
[1] Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru, India
来源
2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA) | 2018年
关键词
Secure data storage; Cloud Computing; Cryptography; Hybrid model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing security refers to protection of data in cloud, its applications and the underlying infrastructure using some set of policies, controls and technologies. Information security or secure data storage, a part of cloud security aims to prevent unauthorized users to access the data and avoids destruction or modification of one's personal information. When one's data is taken to the cloud, lot of security concerns arises and assuring security for the data is still questionable. This paper proposes ways to secure data in cloud using strong cryptographic algorithms like RSA, AES and One Time Pad. Strong cryptographic algorithms are generally mature and unbreakable. Among the existing classical or modern algorithms, one-time pad is an unbreakable algorithm. This paper proposes combination of above three models and analyzes the algorithms by comparing them for storing the data in cloud. The analysis suggests the use of RSA and OTP with variations due to its less time complexity and space complexity.
引用
收藏
页数:6
相关论文
共 19 条
[1]  
Abdul minaam Diaa Salama, 2010, EVALUATING EFFECTS S
[2]  
Chia-Long Wu, 2012, Proceedings of the 2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA), P307, DOI 10.1109/IBICA.2012.9
[3]  
Fei Shao, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P588, DOI 10.1109/ICCSN.2010.124
[4]  
Jeeva AL., 2012, COMP ANAL PERFORMANC
[5]  
Katz Jonathan, 2015, INTRO CRYPTOGRAPHY M
[6]  
Khanezaei Nasrin, 2014, 2014 IEEE C SYST PRO
[7]  
Mahanta Hridoy Jyoti, 2017, 2017 11 INT C INT SY
[8]  
Menezes A.J., HDB APPL CRYPTOGRAPH
[9]  
Monika Agrawal P., 2012, COMP SURVEY SYMMETRI
[10]  
Monttinen Joni, SECURITY ADV ENCRYPT