Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

被引:4
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
关键词
Cloud computing; cloud security; cryptography; image encryption; image storing; security algorithms analysis; DES;
D O I
10.1080/03772063.2021.1990141
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing uses a network of remote servers hosted on the Internet to store, manage, and process data. As the cloud is explicitly unsafe, from the time the cloud platform was utilized for storage many researchers and analysts have been trying to develop many encryption algorithms to provide excellent security on the data. The algorithms' weaknesses, performance and strength should be known to apply a suitable cryptography algorithm to an application. This paper evaluates the efficiency of the encryption techniques AES, DES, 3DES, Blowfish, RC4 and RSA on the basis of image data security and performance in the cloud environment. The algorithms have been subjected to different analytic tests such as differential cryptanalysis, statistical analysis, key sensitivity analysis, and performance analysis to analyses the efficiency of each algorithm for security and performance.
引用
收藏
页码:6053 / 6064
页数:12
相关论文
共 50 条
  • [21] Cloud computing platform: Performance analysis of prominent cryptographic algorithms
    Ajmal, Abdullah
    Ibrar, Sundas
    Amin, Rashid
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15):
  • [22] Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique
    Gadde, Swetha
    Amutharaj, J.
    Usha, S.
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2024, 24 (01)
  • [23] CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Raso, Emanuele
    Naldi, Maurizio
    Bianchi, Giuseppe
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 361 - 368
  • [24] Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques
    Gadde, Swetha
    Amutharaj, J.
    Usha, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 342 - 347
  • [25] Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
    Chong, Bang Yuan
    Salam, Iftekhar
    CRYPTOGRAPHY, 2021, 5 (04)
  • [26] Security threats and approaches in E-Health cloud architecture system with big data strategy using cryptographic algorithms
    Dhanalakshmi, G.
    George, Victo Sudha
    MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4752 - 4757
  • [27] Security Analysis of Cryptographic Algorithms: Hints from Machine Learning
    Paravisi, Mattia
    Visconti, Andrea
    Malchiodi, Dario
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EANN 2024, 2024, 2141 : 569 - 580
  • [28] Analysis on the Security Policy of Education Big Data Based on the Cloud Environment
    Shang, Juanye
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 741 - 745
  • [29] Enhancement for Data Security in Cloud Computing Environment
    Gawali, M. B.
    Wagh, R. B.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [30] Data Security Issues in Cloud Environment and Solutions
    Dinadayalan, P.
    Jegadeeswari, S.
    Gnanambigai, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 88 - +