Analysis of Classical Encryption Techniques in Cloud Computing

被引:17
|
作者
Shabir, Muhammad Yasir [1 ]
Iqbal, Asif [1 ]
Mahmood, Zahid [2 ]
Ghafoor, AtaUllah [3 ]
机构
[1] Univ Management Sci & Informat, Dept Comp Sci, Kotli, AJK, Pakistan
[2] Univ Sci & Technol, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[3] Natl Univ Modern Languages, Dept Comp Sci, Islamabad 44000, Pakistan
关键词
cloud computing; access control; fine-grained access; weighted attribute;
D O I
10.1109/TST.2016.7399287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has become a significant computing model in the IT industry. In this emerging model, computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption (ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.
引用
收藏
页码:102 / 113
页数:12
相关论文
共 50 条
  • [1] Analysis of Classical Encryption Techniques in Cloud Computing
    Muhammad Yasir Shabir
    Asif Iqbal
    Zahid Mahmood
    Ata Ullah Ghafoor
    [J]. Tsinghua Science and Technology, 2016, 21 (01) : 102 - 113
  • [2] Cloud Computing Security by Integrating Classical Encryption
    Goodarzi, Koorosh
    Karimi, Abbas
    [J]. MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013), 2014, 42 : 320 - 326
  • [3] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    [J]. IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [4] Empirical Analysis of the Impact of Homomorphic Encryption on Cloud Computing
    Rout, Chinmayee
    Sethi, Srinivas
    Sahoo, Ramesh Kumar
    Badajena, J. Chandrakanta
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 : 107 - 120
  • [5] Encryption algorithm in cloud computing
    Shukla, Dhirendra K. R.
    Dwivedi, Vijay K. R.
    Trivedi, Munesh C.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2021, 37 : 1869 - 1875
  • [6] Authentication and Encryption in Cloud Computing
    Singh, Jatinder Paul
    Mamta
    Kumar, Sunil
    [J]. 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 216 - 219
  • [7] Enhanced Cloud Computing Security and Integrity Verification via Novel Encryption Techniques
    Kaur, Ranjit
    Singh, Raminder Pal
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1227 - 1233
  • [8] A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment
    Mehmood, Muhammad Sheraz
    Shahid, Muhammad Rehman
    Jamil, Abid
    Ashraf, Rehan
    Mahmood, Toqeer
    Mehmood, Aatif
    [J]. 2019 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT 2019), 2019, : 54 - 59
  • [9] Intrusion Detection Techniques Analysis in Cloud Computing
    Qi, Wuqi
    Wu, Wei
    Wang, Hao
    Ou, Lu
    Hu, Ning
    Tian, Zhihong
    [J]. 2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 360 - 363
  • [10] Hybrid encryption algorithms in cloud computing
    Guo, Ping
    Su, Liping
    Ning, Lijiang
    Dan, Guangxiang
    [J]. Information Technology Journal, 2013, 12 (14) : 3015 - 3019