Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

被引:4
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
关键词
Cloud computing; cloud security; cryptography; image encryption; image storing; security algorithms analysis; DES;
D O I
10.1080/03772063.2021.1990141
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing uses a network of remote servers hosted on the Internet to store, manage, and process data. As the cloud is explicitly unsafe, from the time the cloud platform was utilized for storage many researchers and analysts have been trying to develop many encryption algorithms to provide excellent security on the data. The algorithms' weaknesses, performance and strength should be known to apply a suitable cryptography algorithm to an application. This paper evaluates the efficiency of the encryption techniques AES, DES, 3DES, Blowfish, RC4 and RSA on the basis of image data security and performance in the cloud environment. The algorithms have been subjected to different analytic tests such as differential cryptanalysis, statistical analysis, key sensitivity analysis, and performance analysis to analyses the efficiency of each algorithm for security and performance.
引用
收藏
页码:6053 / 6064
页数:12
相关论文
共 50 条
  • [41] Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
    Radhakrishnan, Indu
    Jadon, Shruti
    Honnavalli, Prasad B.
    SENSORS, 2024, 24 (12)
  • [42] Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [43] An intelligent blockchain-based cryptographic data security model for an efficient data sharing in cloud
    Ramya, Ponnada Naga
    Reddy, I. Ravi Prakash
    Supreethi, K.P.
    International Journal of Cloud Computing, 2024, 13 (05) : 405 - 424
  • [44] A Comprehensive Evaluation of Cryptographic Algorithms in Cloud Computing
    Kulshrestha, Vartika
    Verma, Seema
    Challa, C. Rama K.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 32 - 36
  • [45] Review Of Some Cryptographic Algorithms In Cloud Computing
    Alharbi, Mawaddah Fouad
    Aldosari, Fahd
    Soh, Ben
    Alharbi, Nawaf Fouad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09): : 41 - 50
  • [46] A Review of Cloud Security Based on Cryptographic Mechanisms
    Abd, Sura Khalil
    Al-Haddad, S. A. R.
    Hashim, Fazirulhisyam
    Abdullah, Azizol
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 106 - 111
  • [47] An Advance Cryptographic Solutions in Cloud Computing Security
    Ul Abedin, Zain
    Guan, Zhitao
    Arif, Asad Ullah
    Anwar, Usman
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [48] Optimized Homomorphic Encryption (OHE) algorithms for protecting sensitive image data in the cloud computing environment
    Dewangan R.R.
    Soni S.
    Mishal A.
    International Journal of Information Technology, 2024, 16 (7) : 4143 - 4153
  • [49] Cloud Security Algorithms
    Pansotra, Ashima
    Singh, Simar Preet
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (10): : 353 - 360
  • [50] Safe: Cryptographic Algorithms and Security Principles Gamification
    Al Kaabi, Latifa
    Al Ketbi, Wadha
    Al Khoori, Aysha
    Al Shamsi, Maitha
    Alrabaee, Saed
    PROCEEDINGS OF THE 2022 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2022), 2022, : 1169 - 1178