Analysis of Classical Encryption Techniques in Cloud Computing

被引:0
|
作者
Muhammad Yasir Shabir [1 ]
Asif Iqbal [1 ]
Zahid Mahmood [2 ]
Ata Ullah Ghafoor [3 ]
机构
[1] Department of Computer Science,University of Management Science and Information
[2] School of Computer & Communication Engineering,University of Science and Technology,Beijing
[3] Department of Computer Science,National University of Modern Languages
关键词
cloud computing; access control; fine-grained access; weighted attribute;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.
引用
收藏
页码:102 / 113
页数:12
相关论文
共 50 条
  • [1] Analysis of Classical Encryption Techniques in Cloud Computing
    Shabir, Muhammad Yasir
    Iqbal, Asif
    Mahmood, Zahid
    Ghafoor, AtaUllah
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (01) : 102 - 113
  • [2] Cloud Computing Security by Integrating Classical Encryption
    Goodarzi, Koorosh
    Karimi, Abbas
    [J]. MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013), 2014, 42 : 320 - 326
  • [3] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    [J]. IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [4] Empirical Analysis of the Impact of Homomorphic Encryption on Cloud Computing
    Rout, Chinmayee
    Sethi, Srinivas
    Sahoo, Ramesh Kumar
    Badajena, J. Chandrakanta
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 : 107 - 120
  • [5] Encryption algorithm in cloud computing
    Shukla, Dhirendra K. R.
    Dwivedi, Vijay K. R.
    Trivedi, Munesh C.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2021, 37 : 1869 - 1875
  • [6] Authentication and Encryption in Cloud Computing
    Singh, Jatinder Paul
    Mamta
    Kumar, Sunil
    [J]. 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 216 - 219
  • [7] Enhanced Cloud Computing Security and Integrity Verification via Novel Encryption Techniques
    Kaur, Ranjit
    Singh, Raminder Pal
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1227 - 1233
  • [8] A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment
    Mehmood, Muhammad Sheraz
    Shahid, Muhammad Rehman
    Jamil, Abid
    Ashraf, Rehan
    Mahmood, Toqeer
    Mehmood, Aatif
    [J]. 2019 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT 2019), 2019, : 54 - 59
  • [9] Intrusion Detection Techniques Analysis in Cloud Computing
    Qi, Wuqi
    Wu, Wei
    Wang, Hao
    Ou, Lu
    Hu, Ning
    Tian, Zhihong
    [J]. 2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 360 - 363
  • [10] Hybrid encryption algorithms in cloud computing
    Guo, Ping
    Su, Liping
    Ning, Lijiang
    Dan, Guangxiang
    [J]. Information Technology Journal, 2013, 12 (14) : 3015 - 3019