Skip to main content

Implementing the Comparative Analysis of AES and DES Crypt Algorithm in Cloud Computing

  • Conference paper
  • First Online:
Computer Networks and Inventive Communication Technologies

Abstract

Cloud computing helps users to access information over the internet. Efficiency, scalability and resource consumption are all optimized in cloud computing. Data security is an important concern in cloud computing that can be addressed with cryptography. Cryptography can be defined as a measure to protect confidential information that must be protected from others who are not intended to be viewed in the same way. The use of cryptography is widespread from small schools and colleges to the social media platform that we addicted to. AES and DES cryptographic algorithms are the main concern of this paper and also implementing which algorithm is best in the basis of time and also comparing the differences between these two algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kannan, M., Priya, C., VaishnaviSree, S.: A comparative analysis of DES, AES and RSA crypt algorithms for network security in cloud computing. J. Emerg. Technol. Innovative Res. (JETIR) 6(3) (2019)

    Google Scholar 

  2. Khan, S.K., Tuteja, R.R.: Security in cloud computing using cryptographic algorithms. Int. J. Innovative Res. Compute Commun. Eng. 3(1) (2015)

    Google Scholar 

  3. Hossain, M.A., Hossain, M.B., Uddin, M.S., Imtiaz, S.M.: Performance analysis of different cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3) (2016)

    Google Scholar 

  4. Kalpana, P., Singaraju, S.: Data security in cloud computing using RSA algorithm. Int. J. Res. Comput. Commun. Technol. (IJRCCT) 1(4). ISSN 2278–5841 (2012)

    Google Scholar 

  5. Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6) (2012)

    Google Scholar 

  6. Albgumi, A., Alassafi, M.O., Walters, R., Wills, G.: Data security in cloud computing. In: Fifth International Conference on Future Generation Communication Technologies (2016)

    Google Scholar 

  7. Sugumran, M., Murugan, B.B., kamalraj, D.: An architecture for data security in cloud computing. In: 2014 World Congress on Computing and Communication Technologies, pp. 252–255 (2014)

    Google Scholar 

  8. Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Privacy 7(4), 61–64 (2009)

    Google Scholar 

  9. Rihan, S.D., Khalid, A., Osman, S.E.F.: A performance comparison of encryption algorithms AES and DES. Int. J. Eng. Res. Technol. (IJERT) 4(12), 151–154 (2015)

    Google Scholar 

  10. Bhat, B., Ali, A.W., Gupta, A.: DES and AES performance evaluation. In: International Conference on Computing, Communication and Automation (2015)

    Google Scholar 

  11. Mandal, A.K., Prakash, C., Tiwari, A.: Performance evaluation of cryptographic algorithms: DES and AES. In: 2012 IEEE Students’ Conference on Electrical Electronics and Computer Science (2012)

    Google Scholar 

  12. Arora, R.,Parashar, A.: Secure user data in cloud computing using encryption al gorithms. Int. J. Eng. Res. Appl. (2013)

    Google Scholar 

  13. Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Global J Comput. Sci. Technol. (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Reshma, R.S., Anjusha, P.P., Anisha, G.S. (2022). Implementing the Comparative Analysis of AES and DES Crypt Algorithm in Cloud Computing. In: Smys, S., Bestak, R., Palanisamy, R., Kotuliak, I. (eds) Computer Networks and Inventive Communication Technologies . Lecture Notes on Data Engineering and Communications Technologies, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-16-3728-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3728-5_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3727-8

  • Online ISBN: 978-981-16-3728-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics