DOI QR코드

DOI QR Code

Review Of Some Cryptographic Algorithms In Cloud Computing

  • 투고 : 2021.09.05
  • 발행 : 2021.09.30

초록

Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

키워드

참고문헌

  1. H. Khan and M. Ahamad, "Security Challenges and Threats in Cloud Computing Systems", International Journal of Advanced Research in Computer Science, vol. 8, no. 2, pp. 36-39, 2017.
  2. Peter Mell, Timothy Grance, "The NIST Definition of Cloud Computing" in Special Publication 800-145 (Sept, 2011) .
  3. S. Jagirdar, K. Reddy and D. Qyser, "CLOUD COMPUTING BASICS", International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 5, pp. 343-347, 2012.
  4. M. Alassafi, A. Alharthi, R. Walters and G. Wills, "A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies", Telematics and Informatics, vol. 34, no. 7, pp. 996-1010, 2017. https://doi.org/10.1016/j.tele.2017.04.010
  5. N. Thakkar, M. Karamta, S. Joshi and M. Potdar, "Enhancement of Cloud Security Using Snort", International Journal of Distributed and Cloud Computing, vol. 7, no. 1, pp. 25-29, 2019.
  6. W. Stallings, Cryptography and Network Security, 7th ed. Harlow, United Kingdom: Pearson Education Limited, 2017, pp. 519-544.
  7. "CSA Releases New Research - Top Threats to | Cloud Security Alliance", Cloud Security Alliance, 2019.
  8. . Bhardwaj, A., Subrahmanyam, G., Avasthi, V. and Sastry, H., 2016. Security Algorithms for Cloud Computing. Procedia Computer Science, 85, pp.535-542. https://doi.org/10.1016/j.procs.2016.05.215
  9. Khari, M, Kumar, M & Vaishali 2016, 'Secure data transference architecture for cloud computing using cryptography algorithms', 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on, pp. 2141-2146, viewed 1 December 2020, .
  10. Kulshrestha, V., Verma, S. and Challa, C. R. K. (2016) 'A comprehensive evaluation of cryptographic algorithms in cloud computing', 2016 International Conference on Inventive Computation Technologies (ICICT), Inventive Computation Technologies (ICICT), International Conference on, 1, pp. 1-5. doi: 10.1109/INVENTIVE.2016.7823268.
  11. Chennam, K. K., Muddana, L. and Aluvalu, R. K. (2017) 'Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud', 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2017 2nd IEEE International Conference on, pp. 2030-2033. doi: 10.1109/RTEICT.2017.8256955.
  12. Shaik, K., kumar, N. S. and Narayana Rao, T. V. (2017) 'Implementation of Encryption Algorithm for Data Security in Cloud Computing', International Journal of Advanced Research in Computer Science, 8(3), pp. 579-583. Available at: http://search.ebscohost.com.sdl.idm.oclc.org/login.aspx?direct=true&db=aci&AN=122961285&site=edslive (Accessed: 1 December 2020). https://doi.org/10.26483/ijarcs.v8i9.5184
  13. Pharkkavi, D. and Maruthanayagam, D. (2018) 'Time Complexity Analysis of Rsa and Ecc Based Security Algorithms in Cloud Data', International Journal of Advanced Research in Computer Science, 9(3), pp. 206-213. doi: 10.26483/ijarcs.v9i3.6104.
  14. Beyene, M. and Shekar, K. R. (2019) 'Performance Analysis of Homomorphic Cryptosystem on Data Security in Cloud Computing', 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Computing, Communication and Networking Technologies (ICCCNT), 2019 10th International Conference on, pp. 1-7. doi: 10.1109/ICCCNT45670.2019.8944837.
  15. I. Ahmed, "A brief review: security issues in cloud computing and their solutions", TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 6, p. 2812, 2019. https://doi.org/10.12928/telkomnika.v17i6.12490
  16. S. Mukherjee, "Cloud-based Security Solutions", The IUP Journal of Computer Sciences, vol., no. 4, p. 72, 2019.
  17. Awan, I. A. et al. (2020) 'Secure Framework Enhancing AES Algorithm in Cloud Computing', Security & Communication Networks, pp. 1-16. doi: 10.1155/2020/8863345.
  18. Verma, R. and Sharma, A. K. (2020) 'Simulation-Based Comparative Analysis of Symmetric Algorithms', International Journal of Advanced Research in Computer Science, 11(5), pp. 64-69. doi: 10.26483/ijarcs.v11i5.6655.