PL EN


Preferences help
enabled [disable] Abstract
Number of results
2018 | 112 | 244-251
Article title

Performance of Symmetric Key Cryptography Algorithms in Cloud Storage

Content
Title variants
Languages of publication
EN
Abstracts
EN
Today cloud computing becomes one of the most attractive topics due to the wide opportunities that is provided which aims to enhance the electronic services to a higher-level providing cost saving, expanding possibilities, storage in demand and the huge intake capability as well. Security is one of the most important process that should be implemented in every cloud structure level, especially with data in case of processing or storing to keep it save from unauthorized access to overcome the security challenges and difficulties, which face both provider and users in cloud. In this paper a study to compare the security algorithms for encryption/decryption files has been done to evaluate the performance impact with memory capacity, processing time and algorithms running time. The comparison has been done between three encryption algorithms AES, DES, and Blowfish to determine the performance of each one in cloud storage. From the experimental results we found that DES is faster in running time compared to other algorithms as well as AES considered to be the safest one in data protection.
Year
Volume
112
Pages
244-251
Physical description
Contributors
author
  • Department of Electrical and Electronics Engineering Faculty of Engineering, Red Sea University, Port Sudan, Sudan
  • Department of Electrical and Electronics Engineering Faculty of Engineering, Red Sea University, Port Sudan, Sudan
  • Department of Electrical and Electronics Engineering Faculty of Engineering, Red Sea University, Port Sudan, Sudan
References
  • [1] R. Saranya, V.P. Muthu Kumar, Security issues associated with big data in cloud computing, International Journal of Multidisciplinary Research and Development Volume 2, Issue 4, 580-585, April 2015.
  • [2] Lisa J. Sotto, Bridget C. Treacy, and Melinda L. McLellan, Privacy and Data Security Risks in Cloud Computing, Reproduced with permission from Electronic Commerce & Law Report, Copyright 2010 by The Bureau of National Affairs, Inc. (800372-1033).
  • [3] Ahmed Shawish and Maria Salama, Cloud Computing: Paradigms and Technologies, Techniques and Applications, Studies in Computational Intelligence 495, DOI: 10.1007/978-3-642-35016-0_2 Springer-Verlag Berlin Heidelberg 2014.
  • [4] Hamdan M. Al-Sabri, Saleh M. Al-Saleem, Building a Cloud Storage Encryption (CSE) Architecture for Enhancing Cloud Security. International Journal of Computer Science Issues, Vol. 10, Issue 2, No 1, March 2013.
  • [5] Gurpreet Singh, Supriya Kinger. Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security. International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July 2013.
  • [6] Gurjeevan Singh, Ashwani Kumar, K. S. Sandha. A Study of New Trends in Blowfish Algorithm. International Journal of Engineering Research and Applications 2014, Vol. 1, Issue 2, pp. 321-326.
  • [7] Prachi V. Bhalerao1 et al. Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA. International Journal of Computer Science and Mobile Computing, Vol. 6 Issue 5, May 2017, pg. 84-89.
Document Type
short_communication
Publication order reference
Identifiers
YADDA identifier
bwmeta1.element.psjd-0ca0ab6e-a54c-4b0d-b334-f2eb6475e2bd
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.