Author : S.Rajan 1
Date of Publication :26th April 2018
Abstract: Security plays an important role in all types of computer system from standalone PC to computer system in the cloud. Security can be achieved through cryptographic algorithms. Cryptographic algorithms are categorized as symmetric and asymmetric based on the type of keys used. In pubic Cloud, Data is send through an insecure channel such as internet and stored in a Datacenter which is located far away from the user. So, context effective cryptographic algorithms are needed in the public cloud for transmitting, storing and handling key management. To ensure security, good and context effective cryptographic algorithm should be identified through cryptanalysis. In this paper different cryptographic algorithms are analyzed for efficiency based on computer system used to run algorithm, memory requirement, computational cost and performance
Reference :
-
- Akashdeep Bhardwaj, GVB Subrahmanyam, Vinay Avasthi, Hanumat Sastry, “Security Algorithms for Cloud Computing”, Procedia Computer Science 85 ( 2016 ) 535 – 542
- Jing-Jang Hwang, Taoyuan, Taiwan, Yi-Chang Hsu, Chien-Hsing Wu, “ABusiness Model for Cloud Computing Based on a Separate Encryption and Decryption Service”, international Conference on Informationscience and Applications(ICISA), Pages 1-7, 2011.
- Prakash G L , Dr. Manish Prateek and Dr. Inder Singh, “Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System”, International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume 3 Issue 4 April, 2014 Page No. 5215-5223
- Dr. C.P.Agrawal, Zeenat Hasan, “Analysis of Different Cryptography Algorithms”, International Journal of Scientific Engineering and Applied Science (IJSEAS) – Volume-2, Issue-4,April 2016, ISSN: 2395-3470
- Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, S.S. Gautam and N Purohit, “Performance Analysis of Encryption Algorithm in Cloud Computing”, International Journal of Computer Sciences and Engineering Vol.-3(2), PP(83-89) Feb 2015, E-ISSN: 2347-2693
- Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin, Shariar Md. Imtiaz, “Performance Analysis of Different Cryptography Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering 6(3), March - 2016, pp. 659-665.