Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud

被引:0
|
作者
Chennam, Krishna Keerthi [1 ]
Muddana, Lakshmi [2 ]
Aluvalu, Rajani Kanth [1 ]
机构
[1] GITAM Univ, Hyderabad, Andhra Pradesh, India
[2] GITAM Univ, IT Dept, Hyderabad, Andhra Pradesh, India
关键词
cloudcomputing; access control; multistage encryption; AES; DES; RSA; IDEA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is an emerging technology has grown a lot for virtualization and provides many services over the internet such as software as a service, platform as a service, infrastructure as a service and many more services which reduce the cost expenses and operating expenses. Now by using these services, data can store online in the cloud, then automatically a security concern will arise about data. Many protection techniques have been proposed till now. The best options available is encrypting the data before storing in third party cloud database and again decrypt the data after retrieving from the cloud. We introduce a more economical and robust encryption technique which allows a third-party cloud server to shield user data more expeditiously.
引用
收藏
页码:2030 / 2033
页数:4
相关论文
共 50 条
  • [41] Attribute Based Encryption for Securing Personal Health Record on Cloud
    Gondkar, Deepali A.
    Kadam, V. S.
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICDCS), 2014,
  • [42] Securing Virtual Machine Images of Cloud by Encryption through Kerberos
    Islam, S. M. Neamul
    Rahman, Md Mahbubur
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1074 - 1079
  • [43] Securing the Cloud with Reconfigurable Computing: An FPGA Accelerator for Homomorphic Encryption
    Cilardo, Alessandro
    Argenziano, Domenico
    [J]. PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1622 - 1627
  • [44] Performance Evaluation of Encryption Techniques and Uploading of Encrypted Data in Cloud
    Sreenivas, V.
    Narasimham, C.
    Subrahmanyam, K.
    Yellamma, P.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [45] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    [J]. 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629
  • [46] Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment
    Quazi Warisha Ahmed
    Shruti Garg
    [J]. Journal of Grid Computing, 2022, 20
  • [47] New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing
    Mahmood, Zainab Hikmat
    Ibrahem, Mahmood Khalel
    [J]. 2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 182 - 186
  • [48] Encryption for Massive Data Storage in Cloud
    Ponnuramu, Veeralakshmi
    Tamilselvan, Latha
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 2, 2015, 32 : 27 - 37
  • [49] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [50] Role based access control using identity and broadcast based encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 171 - 182