Implementation of Cryptographic Approaches in Proposed Secure Framework in Cloud Environment

[1]  Sultan Almuhammadi,et al.  A comparative analysis of AES common modes of operation , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[2]  Eli Biham,et al.  New Attacks on IDEA with at Least 6 Rounds , 2013, Journal of Cryptology.

[3]  Manoj Tyagi,et al.  A Framework for Data Storage Security in Cloud , 2018 .

[4]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[5]  Ahmad Hamad,et al.  Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..

[6]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..

[7]  Aleksandr Ometov,et al.  Multi-Factor Authentication: A Survey , 2018, Cryptogr..

[8]  Stephen M. Matyas,et al.  A proposed mode for triple-DES encryption , 1996, IBM J. Res. Dev..

[9]  James Miller,et al.  A Survey and Analysis of Current CAPTCHA Approaches , 2013, J. Web Eng..

[10]  Faraz Fatemi Moghaddam,et al.  A scalable and efficient user authentication scheme for cloud computing environments , 2014, 2014 IEEE REGION 10 SYMPOSIUM.

[11]  W. Wan,et al.  Research and realization based on hybrid encryption algorithm of improved AES and ECC , 2010, 2010 International Conference on Audio, Language and Image Processing.

[12]  Rasha Subhi Ali,et al.  Enhancement CAST block algorithm to encrypt big data , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).

[13]  Imad Fakhri Al-Shaikhli,et al.  Cryptographic Hash Function: A High Level View , 2013, 2013 International Conference on Informatics and Creative Multimedia.

[14]  ParkJong Hyuk,et al.  A survey on cloud computing security , 2016 .

[15]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[16]  Abdallah Karakra,et al.  A-RSA: Augmented RSA , 2016, 2016 SAI Computing Conference (SAI).

[17]  Araceli Queiruga Dios,et al.  Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme , 2015, Cryptologia.

[18]  Hassan M. Elkamchouchi,et al.  A modified serpent based algorithm for image encryption , 2018, 2018 35th National Radio Science Conference (NRSC).