Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

被引:4
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
关键词
Cloud computing; cloud security; cryptography; image encryption; image storing; security algorithms analysis; DES;
D O I
10.1080/03772063.2021.1990141
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing uses a network of remote servers hosted on the Internet to store, manage, and process data. As the cloud is explicitly unsafe, from the time the cloud platform was utilized for storage many researchers and analysts have been trying to develop many encryption algorithms to provide excellent security on the data. The algorithms' weaknesses, performance and strength should be known to apply a suitable cryptography algorithm to an application. This paper evaluates the efficiency of the encryption techniques AES, DES, 3DES, Blowfish, RC4 and RSA on the basis of image data security and performance in the cloud environment. The algorithms have been subjected to different analytic tests such as differential cryptanalysis, statistical analysis, key sensitivity analysis, and performance analysis to analyses the efficiency of each algorithm for security and performance.
引用
收藏
页码:6053 / 6064
页数:12
相关论文
共 50 条
  • [11] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques
    Pardeshi, Suraj R.
    Pawar, Vikul J.
    Kharat, Kailash D.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515
  • [12] A pairing-based cryptographic approach for data security in the cloud
    Morales-Sandoval, Miguel
    Luis Gonzalez-Compean, Jose
    Diaz-Perez, Arturo
    Sosa-Sosa, Victor J.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 441 - 461
  • [13] A pairing-based cryptographic approach for data security in the cloud
    Miguel Morales-Sandoval
    Jose Luis Gonzalez-Compean
    Arturo Diaz-Perez
    Victor J. Sosa-Sosa
    International Journal of Information Security, 2018, 17 : 441 - 461
  • [14] Security Analysis in Cloud Environment
    Akshay, M. S.
    Kakkar, Ashina
    Jayasree, K.
    Prudhvi, P.
    Metgal, Prathibha Shridhara
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 221 - 228
  • [15] Big Data Security in Cloud Environment
    Reddy, Yenumula B.
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 100 - 106
  • [16] Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile data to Cloud
    Sujithra, M.
    Padmavathi, G.
    Narayanan, Sathya
    GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 : 480 - 485
  • [17] On the Security of Medical Image Processing in Cloud Environment
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 89 - 99
  • [18] Analysis of Security Algorithms in Cloud Computing
    Agrawal, Tanvi
    Singh, S. K.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 106 - 108
  • [19] Efficiency and security of some image encryption algorithms
    El-Wahed, Marwa Abd
    Mesbah, Saleh
    Shoukry, Amin
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 561 - +
  • [20] An Overview of Data Security Algorithms in Cloud Computing
    Amalarethinam, D. I. George
    Rajakumari, S. Edel Josephine
    APPLIED INTELLIGENCE AND INFORMATICS, AII 2023, 2024, 2065 : 355 - 367