Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

被引:4
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
关键词
Cloud computing; cloud security; cryptography; image encryption; image storing; security algorithms analysis; DES;
D O I
10.1080/03772063.2021.1990141
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing uses a network of remote servers hosted on the Internet to store, manage, and process data. As the cloud is explicitly unsafe, from the time the cloud platform was utilized for storage many researchers and analysts have been trying to develop many encryption algorithms to provide excellent security on the data. The algorithms' weaknesses, performance and strength should be known to apply a suitable cryptography algorithm to an application. This paper evaluates the efficiency of the encryption techniques AES, DES, 3DES, Blowfish, RC4 and RSA on the basis of image data security and performance in the cloud environment. The algorithms have been subjected to different analytic tests such as differential cryptanalysis, statistical analysis, key sensitivity analysis, and performance analysis to analyses the efficiency of each algorithm for security and performance.
引用
收藏
页码:6053 / 6064
页数:12
相关论文
共 50 条
  • [31] Framework for Security of Shared Data in Cloud Environment
    Shaikh, Aaysha
    Gadge, Jayant
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [32] Big Data Services Security and Security Challenges in Cloud Environment
    Alsufyani, Raed
    Jama, Khursand
    Yao, Yulin
    Ramachandran, Muthu
    Chang, Victor
    IOTBD: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND BIG DATA, 2016, : 461 - 468
  • [33] Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
    Roma, Crystal Andrea
    Tai, Chi-En Amy
    Hasan, M. Anwar
    IEEE ACCESS, 2021, 9 : 71295 - 71317
  • [34] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [35] Analysis of Cryptographic Hashing Algorithms for Image Identification in Deduplication Process
    Sujatha, G.
    Hemavathi, D.
    Sornalakshmi, K.
    Sindhu, S.
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 813 - 823
  • [36] Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
    Kaaniche, Nesrine
    Laurent, Maryline
    COMPUTER COMMUNICATIONS, 2017, 111 : 120 - 141
  • [37] CRYPTOGRAPHIC CLOUD STORAGE WITH PUBLIC VERIFIABILITY: ENSURING DATA SECURITY OF THE YML FRAMEWORK
    Lv, Xin
    Xu, Feng
    Petiton, Serge G.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02): : 111 - 121
  • [38] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Kiraz, Mehmet Sabir
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 731 - 760
  • [39] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Mehmet Sabır Kiraz
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 731 - 760
  • [40] A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing
    Thabit F.
    Can O.
    Alhomdy S.
    Al-Gaphari G.H.
    Jagtap S.
    International Journal of Intelligent Networks, 2022, 3 : 16 - 30