Author : S. SweetlinSusilabai 1
Date of Publication :31st December 2017
Abstract: In today’s world cloud computing grows very fast and transferring a vast amount of data confidentially through clouds by using security algorithms. Clouds are the new platform in Information Technology (IT) and business world. Huge Number of users' stores their secured data on Cloud. We send more private data in the clouds. Data security is the most important role in transferring data through clouds. Cryptography is a technique that allows the user to send and receive the confidential data using security algorithms. So, data security is an important factor in cloud computing for ensuring clients data is placed in the secure mode in the cloud. In this paper, there are a number of existing cryptographic techniques used to implement security in cloud and we have to discuss the number of symmetric and asymmetric algorithms. We have focused on a comparative study of various cryptographic algorithms like DES, 3DES, AES, RC2, RC4, RC5, RC6, TWOFISH, THREEFISH, BLOWFISH, and RSA. We have to analyze their ability to secure data, key size, block size, features
Reference :
-
- Aamer Nadeem, Dr M. Younus Javed “A Performance Comparison of Data Encryption Algorithms”,IEEE-2005.
- Ankita verma, Paramita guha, Sunitha Misra,”Comparative Study of Different Cryptographic Algorithms” International journal of emerging &Technology in computer science(IJETTCS),volume 5, Issue 2,March –April 2016
- Brijesh Kumar Patel, Mukti Pathak “Survey on Cryptography Algorithms” International Journal of Innovative Technology and Exploring Engineering (IJITEE),ISSN: 2278-3075, Volume-4 Issue-7, December 2014
- Chaitali Haldankar, Sonia Kuwelkar “Implementation of AES and blowfish Algorithm “ IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN:2321-7308, Volume: 03 Special Issue: 03 | May-2014 | NCRIET2014
- Deepika Rani Bansal and Preeti Thakur,”A review of symmetric key and asymmetric key encryption algorithms “, International Journal of Computer Science Engineering (IJCSE), Vol. 5 ,Mar 2016
- Gurjeevan Singh, Ashwani Kumar Singla, K.S. Sandha “Through Put Analysis of Various Encryption Algorithms”, IJCST, Vol 2, September 2011