Author : S. SweetlinSusilabai 1
Date of Publication :31st December 2017
Abstract: In today’s world cloud computing grows very fast and transferring a vast amount of data confidentially through clouds by using security algorithms. Clouds are the new platform in Information Technology (IT) and business world. Huge Number of users' stores their secured data on Cloud. We send more private data in the clouds. Data security is the most important role in transferring data through clouds. Cryptography is a technique that allows the user to send and receive the confidential data using security algorithms. So, data security is an important factor in cloud computing for ensuring clients data is placed in the secure mode in the cloud. In this paper, there are a number of existing cryptographic techniques used to implement security in cloud and we have to discuss the number of symmetric and asymmetric algorithms. We have focused on a comparative study of various cryptographic algorithms like DES, 3DES, AES, RC2, RC4, RC5, RC6, TWOFISH, THREEFISH, BLOWFISH, and RSA. We have to analyze their ability to secure data, key size, block size, features
Reference :