Analysis of Security Algorithms in Cloud Environment

Authors

  • Simranjeet Kaur Department of Information Technology, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
  • Prajakta Shinde Department of Information Technology, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
  • Jueily Joshi Department of Information Technology, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
  • B. S. Dakhare Department of Information Technology, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India

Keywords:

Symmetric key Algorithms, Asymmetric Key Algorithms, hybrid, Encryption & Decryption time, Data security

Abstract

Cloud computing is a virtual pool of resources and it provides these resources to users via the internet. People are storing their huge amount of data over the cloud. In recent years, Storage in Cloud gained popularity among both companies and private users. However, data privacy, security, reliability and interoperability issues still have to be adequately solved. But the most important problem is security and how cloud provider assures it. For ensuring privacy there are multiple encryption algorithms. Encryption is the process of encoding information or data precisely to prevent unauthorized access. This paper discusses the comparison of various cryptographic encryption algorithms with their various key features & then later discusses their performance cost based on the encryption time, decryption time, power consumption, memory usage, latency and security level. Moreover, this paper has compared the efficiency of each algorithm in cloud computing. The comparison will be between symmetric key algorithms which will include blowfish, AES-256 algorithm, Asymmetric algorithms like RSA, hybrid algorithms like RSA with AES-256 and RSA with blowfish.

Downloads

Download data is not yet available.

Downloads

Published

19-05-2021

Issue

Section

Articles

How to Cite

[1]
S. Kaur, P. Shinde, J. Joshi, and B. S. Dakhare, “Analysis of Security Algorithms in Cloud Environment”, IJRESM, vol. 4, no. 5, pp. 33–37, May 2021, Accessed: Apr. 23, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/716