PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY

被引:0
|
作者
Vennela, G. Sai [1 ]
Varun, N. Venkata [1 ]
Neelima, N. [2 ]
Priya, L. Sai [1 ]
Yeswanth, J. [1 ]
机构
[1] VR Siddhartha Engn Coll, Dept Informat Technol, Vijayawada, Andhra Pradesh, India
[2] VR Siddhartha Engn Coll, Dept IT, Vijayawada, Andhra Pradesh, India
关键词
Cloud Computing; Encryption Algorithms; Data Privacy; Performance analysis; Encryption Throughput; Encryption Memory; AES; Blowfish;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud generally relates to storing, processing and managing of data over a network. The cloud provides mainly three services, storage as a service, platform as a service and software as a service using internet, based on the user's demand. As it became a vital platform, many companies are building their infrastructure. This has increased the corresponding vulnerabilities and threats as these services are often provided by third parties. So, security of the information in the cloud is a noteworthy issue for the cloud client. On the other hand, Performance of the security-based algorithms is another major concern. So, the work plan is to analyze the efficiency of these algorithms, based on the encryption time, decryption time, encryption throughput and memory utilized for encryption by the algorithms for different sizes of file formats like text, image and video. Further, eliminating the privacy concerns of data stored in cloud by enhancing the security using encryption algorithms like DES,3DES,AES and BLOWFISH.
引用
收藏
页码:273 / 279
页数:7
相关论文
共 50 条
  • [1] A Comparative Study of Cryptographic Algorithms for Cloud Security
    Yusufzai, Asifkhan
    Ranpara, Ripal
    Vora, Mital
    Kumbharana, C. K.
    [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 409 - 415
  • [2] Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
    Rahul, B.
    Kuppusamy, K.
    [J]. IETE JOURNAL OF RESEARCH, 2023, 69 (09) : 6053 - 6064
  • [3] In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security
    Khan, Najeeb Ahmad
    Panchal, V. K.
    Tanweer, Safdar
    [J]. ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 27 - 41
  • [4] Cloud computing platform: Performance analysis of prominent cryptographic algorithms
    Ajmal, Abdullah
    Ibrar, Sundas
    Amin, Rashid
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15):
  • [5] A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
    Can, Ozgu
    Thabit, Fursan
    Aljahdali, Asia Othman
    Al-Homdy, Sharaf
    Alkhzaimi, Hoda A.
    [J]. CYBERNETICS AND SYSTEMS, 2023,
  • [6] Comparative Analysis on the Performance of Selected Security Algorithms in Cloud Computing
    Cordova, Ronald S.
    Maata, Rolou Lyn R.
    Halibas, Alrence S.
    Al-Azawi, Rula
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, : 274 - 277
  • [7] Analysis of NIST Lightweight Cryptographic Algorithms Performance in IoT Security Environments based on MQTT
    Voloshyn, Volodymyr
    Khan, Mohammad S.
    Srivastava, Gautam
    Darshan, M.
    [J]. 2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [8] Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
    Thabit, Fursan
    Can, Ozgu
    Wani, Rizwan Uz Zaman
    Qasem, Mohammed Ali
    Thorat, S. B.
    Alkhzaimi, Hoda A. A.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [9] Analysis of Security Algorithms in Cloud Computing
    Agrawal, Tanvi
    Singh, S. K.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 106 - 108
  • [10] Performance Analysis of Symmetric Key Cryptographic Algorithms
    Vyakaranal, Shashidhara
    Kengond, Shivaraj
    [J]. PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 411 - 415