Analyzing the Behavior of Symmetric Algorithms Usage in Securing and Storing Data in Cloud

被引:0
|
作者
Sharma, Ashok [1 ]
Thakur, Ramjeevan Singh [2 ]
Jaloree, Shailesh [3 ]
机构
[1] BU, Dept Comp Sci, Bhopal, India
[2] MANIT, Bhopal, India
[3] SATI, Vidisha, India
来源
INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES | 2018年 / 19卷
关键词
Encryption time; Decryption time; SLA; EDaS;
D O I
10.1007/978-981-10-5523-2_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It has been found that the Cloud computing facilities have been used by users of various categories to meet their flexible computing needs which include Processing Powers, Storages, Servers, etc., and among these needs, Public Cloud storage has been used for storing huge data files of different formats and different sizes in Cloud. Because of data security concerns in Cloud, symmetric algorithms have been preferred for encryption and decryption of these data files. Because of limited Internet speed, we must have provision to identify fast and efficient symmetric algorithms for Cloud storages. In the literature survey, we have not found any framework to investigate the efficiency of symmetric algorithms in securing and storing data in Cloud based on various parameters like Encryption Time, Decryption Time, and Throughput, etc.
引用
收藏
页码:381 / 389
页数:9
相关论文
共 50 条
  • [31] Securing Cloud Data Using a Pirate Scheme
    CHENG Hongbing
    QIAN Manyun
    YU Shui
    Chinese Journal of Electronics, 2017, 26 (06) : 1289 - 1296
  • [32] Securing Cloud Data Using a Pirate Scheme
    Cheng Hongbing
    Qian Manyun
    Yu Shui
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (06) : 1289 - 1296
  • [33] Mobile Cloud Computing Framework for Securing Data
    Ikram, Arfa Arslaan
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Abid, Rabia
    Crichigno, Jorge
    Srivastava, Gautam
    2021 44th International Conference on Telecommunications and Signal Processing, TSP 2021, 2021, : 309 - 315
  • [34] Securing Big Data in the Cloud with Integrated Auditing
    Wang, Yong
    Rawal, Bharat
    Duan, Qiang
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, : 126 - 131
  • [35] An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms
    Njuki, Sam
    Zhang, Jianbiao
    Too, Edna C.
    Richard, Rimiru
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND SYSTEMS (ICACS 2018), 2018, : 14 - 20
  • [36] Mobile Cloud Computing Framework for Securing Data
    Ikram, Arfa Arslaan
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Abid, Rabia
    Crichigno, Jorge
    Srivastava, Gautam
    2021 44TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2021, : 309 - 315
  • [37] Storing and Using Health Data in a Virtual Private Cloud
    Regola, Nathan
    Chawla, Nitesh V.
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2013, 15 (03) : 3 - 14
  • [38] A Confidentiality Scheme for Storing Encrypted Data through Cloud
    Timraz, Karim
    Barhoom, Tawfiq
    Fatayer, Tamer
    2019 IEEE 7TH PALESTINIAN INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (PICECE), 2019,
  • [39] An Approach For Securing Data On Cloud Using Data Slicing And Cryptography
    Bobde, Rupesh R.
    Khaparde, Amit
    Raghuwanshi, M. M.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [40] Storing "OPTIK" Data in Cloud: Photonics for Embedded Application
    Swain, K. P.
    Nayak, S. K.
    Palai, G.
    Sarkar, Partha
    ADVANCES IN DATA SCIENCE AND MANAGEMENT, 2020, 37 : 283 - 288