A Comparative Study of Cryptographic Algorithms for Cloud Security

被引:1
|
作者
Yusufzai, Asifkhan [1 ,2 ]
Ranpara, Ripal [1 ,2 ]
Vora, Mital [1 ,2 ]
Kumbharana, C. K. [1 ,2 ]
机构
[1] Shree MN Virani Sci Coll, TNRAO Coll, Rajkot, Gujarat, India
[2] Saurashtra Univ, Dept Comp Sci, Rajkot, Gujarat, India
关键词
Cloud computing; Cryptographic algorithm; Cloud security;
D O I
10.1007/978-981-13-2285-3_48
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the growing technology in the world, there has been a drastic change in the usage, popularity, and requirement of cloud computing. With the popularity of cloud computing, it's required and need arise to secure the data in cloud. In the cloud computing, security is a prime concern as well as it is also found as a critical issue. There is an increasing demand to secure data in cloud computing and usage of security algorithms. So, we have discussed in detail about cryptographic algorithms with different security issues and our main goal of this paper is to compare three cryptographic algorithms.
引用
收藏
页码:409 / 415
页数:7
相关论文
共 50 条
  • [1] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY
    Vennela, G. Sai
    Varun, N. Venkata
    Neelima, N.
    Priya, L. Sai
    Yeswanth, J.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
  • [2] Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
    Rahul, B.
    Kuppusamy, K.
    [J]. IETE JOURNAL OF RESEARCH, 2023, 69 (09) : 6053 - 6064
  • [3] A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
    Can, Ozgu
    Thabit, Fursan
    Aljahdali, Asia Othman
    Al-Homdy, Sharaf
    Alkhzaimi, Hoda A.
    [J]. CYBERNETICS AND SYSTEMS, 2023,
  • [4] In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security
    Khan, Najeeb Ahmad
    Panchal, V. K.
    Tanweer, Safdar
    [J]. ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 27 - 41
  • [5] Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
    Thabit, Fursan
    Can, Ozgu
    Wani, Rizwan Uz Zaman
    Qasem, Mohammed Ali
    Thorat, S. B.
    Alkhzaimi, Hoda A. A.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [6] A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Jha, NK
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (02) : 128 - 143
  • [7] A comparative performance study of cryptographic algorithms for connected vehicles
    Fazzat, Abdessamad
    Khatoun, Rida
    Labiod, Houda
    Dubois, Renaud
    [J]. 2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
  • [8] A Comparative Study of Cloud Security Ontologies
    Singh, Vaishali
    Pandey, S. K.
    [J]. 2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [9] Comparative Analysis on the Performance of Selected Security Algorithms in Cloud Computing
    Cordova, Ronald S.
    Maata, Rolou Lyn R.
    Halibas, Alrence S.
    Al-Azawi, Rula
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, : 274 - 277
  • [10] A Review of Cloud Security Based on Cryptographic Mechanisms
    Abd, Sura Khalil
    Al-Haddad, S. A. R.
    Hashim, Fazirulhisyam
    Abdullah, Azizol
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 106 - 111