Advertisement

Security Algorithms for Cloud Based Applications

  • Bushra ShaheenEmail author
  • Farheen Siddiqui
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 39)

Abstract

The concept of cloud computing provides various scalable resources and dynamic capacity of storage which performs operations on the internet. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in accessibility of data. Data protection is also one of the major concern of cloud computing and in order to provide the security to it’s users, cloud computing uses different cryptographic encryption algorithm. The main concern of this paper is to analyze which encryption algorithm will be most efficient and convenient to be used in cloud computing to secure data as well as less time consuming algorithm. Analysis have been done on different criteria like block size, key length, security and speed, encryption flow chart and decryption flow chart.

Keywords

Cloud computing Data security Encryption algorithm AES DES RSA Public key Private key 

References

  1. 1.
    Ganapathy, S.: A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Comput. Netw. 151, 181–190 (2019)CrossRefGoogle Scholar
  2. 2.
    Rath, M.: Resource provision and QoS support with added security for client side applications in cloud computing. Int. J. Inf. Technol. 11(2), 357–364 (2019)Google Scholar
  3. 3.
    Agarwal, R., Pranay, S.S., Rachana, K., Parveen Sultana, H.: Identity-based security scheme in internet of vehicles. In: Smart Intelligent Computing and Applications, pp. 515–523. Springer, Singapore (2019)Google Scholar
  4. 4.
    Manzoor, A., Liyanage, M., Braeke, A., Kanhere, S.S., Ylianttila, M.: Blockchain based proxy re-encryption scheme for secure IoT data sharing. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 99–103. IEEE (2019)Google Scholar
  5. 5.
    Arulmozhi, P., Rayappan, J.B.B., Raj, P.: A lightweight memory-based protocol authentication using radio frequency identification (RFID). In: Advances in Big Data and Cloud Computing, pp. 163–172. Springer, Singapore (2019)Google Scholar
  6. 6.
    Sahu, M.T.S.N.K., Pal, A.K.: A Review on Analysis of Data Search Scheme for Secure Information Retrieval in Cloud Computing (2019)Google Scholar
  7. 7.
    Zhu, L., Wu, Y., Gai, K., Choo, K.K.R.: Controllable and trustworthy blockchain-based cloud data management. Future Generation Computer Systems 91, 527–535 (2019)CrossRefGoogle Scholar
  8. 8.
    Roy, M., Mali, K., Chatterjee, S., Chakraborty, S., Debnath, R., Sen, S.: A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 881–886. IEEE (2019)Google Scholar
  9. 9.
    Stergiou, C., Plageras, A.P., Psannis, K.E., Gupta, B.B.: Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network (2019)Google Scholar
  10. 10.
    Gupta, V., Johari, R., Gupta, K., Bhatia, R., Seth, S.: LBCLCT: location based cross language cipher technique. In: Smart Cities Performability, Cognition, & Security, pp. 221–234. Springer, Cham (2020)Google Scholar
  11. 11.
    Naseri, A., Navimipour, N.J.: A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm. J. Ambient Intell. Hum. Comput. 10(5), 1851–1864 (2019)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of CSE, SESTJamia HamdardNew DelhiIndia

Personalised recommendations