Secure Algorithm for Cloud Computing and Its Applications

被引:0
|
作者
Bhandari, Akshita [1 ]
Gupta, Ashutosh [2 ]
Das, Debasis [1 ]
机构
[1] NIIT Univ, Dept CSE, Alwar 301705, Rajasthan, India
[2] NIIT Univ, Dept BT, Alwar 301705, Rajasthan, India
关键词
Data Security; Hybrid Encryption; Advanced Encryption Standard; Brute Force Attack; Cloud Computing; Secure Multi-Party Computation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a rising technology that is still unclear to many security issues. The most challenging issue today in cloud servers is to ensure data security and privacy of the users. The proposed schema presents HE-RSA or hybrid encryption RSA along with Advanced Encryption Standard or AES to ensure efficiency, consistency and trustworthiness in cloud servers. The goal of this paper is to use various cryptography concepts during communication along with its application in cloud computing and to enhance the security of ciphertext or encrypted data in cloud servers along with minimizing the consumption of time, cost and memory size during encryption and decryption.
引用
收藏
页码:188 / 192
页数:5
相关论文
共 50 条
  • [1] Secure Framework Enhancing AES Algorithm in Cloud Computing
    Awan, Ijaz Ahmad
    Shiraz, Muhammad
    Hashmi, Muhammad Usman
    Shaheen, Qaisar
    Akhtar, Rizwan
    Ditta, Allah
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [2] A Secure Density Peaks Clustering Algorithm on Cloud Computing
    Ci, Shang
    Sun, Liping
    Liu, Xiaoqing
    Du, Tingli
    Zheng, Xiaoyao
    [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 533 - 541
  • [3] Obfuscating encrypted threshold signature algorithm and its applications in cloud computing
    Li, Yahong
    Wei, Jianzhou
    Wu, Bin
    Wang, Chunli
    Wang, Caifen
    Zhang, Yulei
    Yang, Xiaodong
    [J]. PLOS ONE, 2021, 16 (04):
  • [4] Vulnerabilities and Secure Coding for Serverless Applications on Cloud Computing
    Kim, Yonghwan
    Koo, Jahwan
    Kim, Ung-Mo
    [J]. HUMAN-COMPUTER INTERACTION: USER EXPERIENCE AND BEHAVIOR, PT III, 2022, 13304 : 145 - 163
  • [5] Cloud Computing Technology and Its Applications
    Zhao Pei
    [J]. ZTE Communications, 2010, 8 (04) : 34 - 38
  • [6] Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing
    Jiang, Mingfang
    Yang, Hengfu
    [J]. IEEE ACCESS, 2020, 8 : 106958 - 106967
  • [7] Optimally Efficient Secure Scalar Product With Applications in Cloud Computing
    Siabi, BabaK
    Berenjkoub, Mehdi
    Susilo, Willy
    [J]. IEEE ACCESS, 2019, 7 : 42798 - 42815
  • [8] A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing
    Ko, Hoon
    Mesicek, Libor
    Choi, Jongsun
    Choi, Junho
    Hwang, Seogchan
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (01) : 143 - 153
  • [9] Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm
    Abdulhamid, Shafi'i Muhammad
    Abd Latiff, Muhammad Shafie
    Abdul-Salaam, Gaddafi
    Madni, Syed Hamid Hussain
    [J]. PLOS ONE, 2016, 11 (07):
  • [10] Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm
    Maitri, Punam V.
    Verma, Aruna
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1635 - 1638