Cloud computing platform: Performance analysis of prominent cryptographic algorithms

With advancements in science and technology, cloud computing is the next big thing in the industry. Cloud cryptography is a technique that uses encryption algorithms to secure data. The significant advantage of cloud storage is no difficulty to get to, diminished equipment, low protection, and fixing cost so every association is working with the cloud. Encryption is the process of encoding information to prevent unauthorized access. Nowadays, we desire to secure the information that is to be stored in our computer or transmitted utilizing the internet against attacks. The cryptographic method depends on their response time, confidentiality, bandwidth, and integrity. Furthermore, security is a significant factor in cloud computing for ensuring client data is placed on the safe mode in the cloud. Our research paper compares the efficiency, usage, and utility of available cryptography algorithms. Evaluation results suggest which algorithm is better for which type of data and environment.

[1]  S. U. Aswathy,et al.  RETRACTED ARTICLE: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment , 2020, Journal of Ambient Intelligence and Humanized Computing.

[2]  W. Budiharto,et al.  Image Data Encryption Using DES Method , 2021, 2021 1st International Conference on Computer Science and Artificial Intelligence (ICCSAI).

[3]  Olayiwola Abisola Ayomide,et al.  A Cloud Computing Platform On File Storage And Sharing Using Rijndeal Algorithms , 2021 .

[4]  Gunasekaran Manogaran,et al.  FAST: Fast Accessing Scheme for data Transmission in cloud computing , 2021, Peer-to-Peer Netw. Appl..

[5]  G. Sujatha,et al.  Digital Data Identification for Deduplication Process using Cryptographic Hashing Techniques , 2021, 2021 International Conference on Intelligent Technologies (CONIT).

[6]  Dilip Kumar Sharma,et al.  Securing data in transit using data-in-transit defender architecture for cloud communication , 2021, Soft Computing.

[7]  T. M.,et al.  Enhanced DNA Cryptosystem for Secure Cloud Data Storage , 2021, 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC).

[8]  Pulkit Kumar,et al.  A Novel Approach for Security in Cloud Data Storage Using AES-DES-RSA Hybrid Cryptography , 2021, 2021 Emerging Trends in Industry 4.0 (ETI 4.0).

[9]  Somchart Fugkeaw,et al.  An Analytical Review of Data Access Control Schemes in Mobile Cloud Computing , 2021, Lecture Notes in Networks and Systems.

[10]  M. Ali,et al.  Applications of Cryptography in Database: A Review , 2021, 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS).

[11]  K. Karibasappa,et al.  Enhancing Data Protection in Cloud Computing using Key Derivation based on Cryptographic Technique , 2021, 2021 5th International Conference on Computing Methodologies and Communication (ICCMC).

[12]  I. Tayubi,et al.  Comparative Analysis of Security Algorithms used in Cloud Computing , 2021, 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom).

[13]  Preeti Saini,et al.  Advanced Encryption Standard: Attacks and Current Research Trends , 2021, 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE).

[14]  Sina Besharat,et al.  Security of internet of things based on cryptographic algorithms: a survey , 2021, Wireless Networks.

[15]  Sudhir Jagtap,et al.  Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing , 2021, Global Transitions Proceedings.

[16]  G. R. Gangadharan,et al.  SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing , 2021, Journal of Ambient Intelligence and Humanized Computing.

[17]  T. Jayasankar,et al.  IoT enabled cancer prediction system to enhance the authentication and security using cloud computing , 2020, Microprocess. Microsystems.

[18]  Ali Ghaffari,et al.  Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems , 2020, Journal of Ambient Intelligence and Humanized Computing.

[19]  Khaled Shaalan,et al.  Systematic Review on Fully Homomorphic Encryption Scheme and Its Application , 2020, Recent Advances in Intelligent Systems and Smart Applications.

[20]  Karthik Subburathinam,et al.  Implementation of enhanced blowfish algorithm in cloud environment , 2020, J. Ambient Intell. Humaniz. Comput..

[21]  Azman Samsudin,et al.  Using Blockchain in Cloud Computing to Enhance Relational Database Security , 2021, IEEE Access.

[22]  Mayank Singh,et al.  Cloud data security and various security algorithms , 2021 .

[23]  Mhamad Bakro,et al.  Performance Analysis of Cloud Computing Encryption Algorithms , 2021 .

[24]  Kamel H. Rahouma,et al.  Hybrid Cryptographic Approach to Safeguard Cloud Computing Services: A Survey , 2021, AMLTA.

[25]  Haibo Hong,et al.  A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices , 2021, Future Gener. Comput. Syst..

[26]  R. Kalaiselvi Custom-Aes: A Novel Framework To Enhance Data Security In Cloud Environment , 2021 .

[27]  The "Essence" of Network Security: An End-to-End Panorama , 2021, Lecture Notes in Networks and Systems.

[28]  Advin Manhar,et al.  A Review on Cryptography in Cloud Computing , 2020 .

[29]  Kamlesh Gupta,et al.  Session key based fast, secure and lightweight image encryption algorithm , 2020, Multimedia Tools and Applications.

[30]  Vijay K. Vasudevan,et al.  Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm , 2020 .

[31]  Sefer Kurnaz,et al.  Internet Of Things And Cloud Computing - A Review , 2020, 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT).

[32]  Doug Young Suh,et al.  A Review of Machine Learning Algorithms for Cloud Computing Security , 2020, Electronics.

[33]  Munesh Chandra Trivedi,et al.  Encryption algorithm in cloud computing , 2020 .

[34]  Mahesh Chandra Govil,et al.  A Hybrid Symmetric Key Cryptography Method to Provide Secure Data Transmission , 2020, ICML 2020.

[35]  Zahid Mehmood,et al.  CryptoGA: a cryptosystem based on genetic algorithm for cloud data security , 2020, Cluster Computing.

[36]  S. Sangeetha,et al.  A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography , 2020, Complex & Intelligent Systems.

[37]  Pan Jun Sun,et al.  Security and privacy protection in cloud computing: Discussions and challenges , 2020, J. Netw. Comput. Appl..

[38]  Alabi Orobosade,et al.  Cloud Application Security using Hybrid Encryption , 2020 .

[39]  Xiaodong Wang,et al.  Security information transmission algorithms for IoT based on cloud computing , 2020, Comput. Commun..

[40]  Abdullah Aljumah,et al.  Cyber security threats, challenges and defence mechanisms in cloud computing , 2020, IET Commun..

[41]  Latha Tamilselvan,et al.  Elliptic curve Diffie–Hellman cryptosystem in big data cloud security , 2020, Cluster Computing.

[42]  A. Shanthini,et al.  Towards DNA based data security in the cloud computing environment , 2020, Comput. Commun..

[43]  Gautam Srivastava,et al.  An efficient public key secure scheme for cloud and IoT security , 2020, Comput. Commun..

[44]  Malay Kule,et al.  Prevention of the Man-in-the-Middle Attack on Diffie–Hellman Key Exchange Algorithm: A Review , 2020 .

[45]  Bharat Mishra,et al.  Implementation of Cryptographic Approaches in Proposed Secure Framework in Cloud Environment , 2020 .

[46]  S. Padmavathi,et al.  Efficient Data Security Using Hybrid Cryptography on Cloud Computing , 2020 .

[47]  Rafat Karim,et al.  Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption , 2020 .

[48]  Sura F. Yousif,et al.  Implementation of El-Gamal algorithm for speech signals encryption and decryption , 2020 .

[49]  B. B. Gupta,et al.  Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network , 2020, Handbook of Computer Networks and Cyber Security.

[50]  Performance Management of Integrated Systems and its Applications in Software Engineering , 2020, Asset Analytics.

[51]  Suvanam Sasidhar Babu,et al.  Enhancing the security of cloud data using hybrid encryption algorithm , 2019, Journal of Ambient Intelligence and Humanized Computing.

[52]  Sumit Chaudhary,et al.  Comparative Study Between Cryptographic and Hybrid Techniques for Implementation of Security in Cloud Computing , 2019, Asset Analytics.

[53]  Parul Agarwal,et al.  Secure keyword search using dual encryption in cloud computing , 2020 .

[54]  Ariel M. Sison,et al.  A New Approach in Expanding the Hash Size of MD5 , 2018, Int. J. Commun. Networks Inf. Secur..

[55]  Kamal Kumar Chauhan,et al.  Homomorphic Encryption for Data Security in Cloud Computing , 2015, 2015 International Conference on Information Technology (ICIT).

[56]  Layuan Li,et al.  Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing , 2014, Wirel. Pers. Commun..

[57]  Amritpal Singh,et al.  COMPARATIVE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS , 2013 .

[58]  Parsi Kalpana,et al.  Data Security in Cloud Computing using RSA Algorithm , 2012 .

[59]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.