Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud

被引:0
|
作者
Chennam, Krishna Keerthi [1 ]
Muddana, Lakshmi [2 ]
Aluvalu, Rajani Kanth [1 ]
机构
[1] GITAM Univ, Hyderabad, Andhra Pradesh, India
[2] GITAM Univ, IT Dept, Hyderabad, Andhra Pradesh, India
关键词
cloudcomputing; access control; multistage encryption; AES; DES; RSA; IDEA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is an emerging technology has grown a lot for virtualization and provides many services over the internet such as software as a service, platform as a service, infrastructure as a service and many more services which reduce the cost expenses and operating expenses. Now by using these services, data can store online in the cloud, then automatically a security concern will arise about data. Many protection techniques have been proposed till now. The best options available is encrypting the data before storing in third party cloud database and again decrypt the data after retrieving from the cloud. We introduce a more economical and robust encryption technique which allows a third-party cloud server to shield user data more expeditiously.
引用
收藏
页码:2030 / 2033
页数:4
相关论文
共 50 条
  • [21] Enhanced Symmetric Encryption Technique for Securing Users' Data in Public Cloud Environment
    Fairosebanu, A.
    Jebaseeli, A. Nisha
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 785 - 791
  • [23] Performance analysis of AES and MARS encryption algorithms
    Mohan, H.S.
    Raji Reddy, A
    [J]. International Journal of Computer Science Issues, 2011, 8 (4 4-1): : 363 - 368
  • [24] Performance Analysis of Encryption Algorithms on Mobile Devices
    Montoya, Alber O. B.
    Munoz, Mario A. G.
    Kofuji, Sergio T.
    [J]. 2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [25] Performance Analysis of Encryption Algorithms for Information Security
    Ramesh, A.
    Suruliandi, A.
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 840 - 844
  • [26] Hybrid encryption algorithms in cloud computing
    Guo, Ping
    Su, Liping
    Ning, Lijiang
    Dan, Guangxiang
    [J]. Information Technology Journal, 2013, 12 (14) : 3015 - 3019
  • [27] Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines
    Hu, Yaohui
    Panhale, Sanket
    Li, Tianlin
    Kaynar, Emine
    Chan, Danny
    Deshpande, Umesh
    Yang, Ping
    Gopalan, Kartik
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 613 - 620
  • [28] Performance characteristics of Itanium™ processor on data encryption algorithms
    Bui, TH
    [J]. WWC-4: IEEE INTERNATIONAL WORKSHOP ON WORKLOAD CHARACTERIZATION, 2001, : 54 - 62
  • [29] A Technical Overview on the Usage of Cloud Encryption Services
    Carvalho, Daniel
    Morais, Joao
    Almeida, Joao
    Martins, Pedro
    Quental, Carlos
    Caldeira, Filipe
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 733 - 741
  • [30] Secure Cloud Data Encryption
    Shiraishi, Momoko
    [J]. 2023 2ND ASIA-PACIFIC COMPUTER TECHNOLOGIES CONFERENCE, APCT, 2023, : 34 - 37