Analysis of Frameworks in Cloud Environment

Authors

  • Ashima Narang Assistant Professor, Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University Haryana, Gurugram, India, Author

Keywords:

RSA, ECC, Hybrid, Cloud Computing, Encryption

Abstract

Cloud is one of the advances, whose  utilization is being expanded step by step for various  purposes according to client's prerequisite. For the most  part this innovation is utilized for capacity reason as a result  of this, the clients need not to have any equipment  stockpiling gadgets rather than that their information will  be put away on the system. These frameworks must be  increasingly secure with the goal that they give secrecy,  protection and assurance for their consumer loyalty.  Different calculations were created to make sure about  cloud systems yet these calculations can't meet the  prerequisites of the clients. In this paper, there is a  comparison, of a hybrid approach and the individual  algorithm to get the best results.  

Downloads

Download data is not yet available.

References

Hongbing Wang and Zhenfu Cao, “A Fully Secure Unidirectional and Multi-use Proxy Re-encryption Scheme”, 2009.

N. Koblitz. Elliptic curve cryptosystems Mathematics of Computation, 48:203–209, 1987

V. Miller. Use of elliptic curves in cryptography .Advances in Cryptology—CRYPTO ’85 (LNCS 218) [483], 417–426, 1986

A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” In :Advances in Cryptology - Proceedings of CRYPTO'84, Lecture Notes of Computer Science (LNCS), vol.196, pp.47-53, 1985

M. Preetha, “A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM”, International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 6, June 2013, pg.126 – 139.

G.Prabu kanna, “Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) – 2016, pp. 3688-3693

A. D. Gupta, “Comparative Analysis of Various Cloud Security Frameworks”, International Conference on cyber security and privacy in communication networks (ICCS-2018), pp. 379-384.

D.Boneh, M.Franklin, Identity-based encryption from the weil pairing, Advances in Cryptology–CRYPTO2001, SantaBarbara, California,USA, LNCS, 2139, Springer, Berlin, 2001.

FarazFatemiMoghaddam, Maen T. Alrashdan, and OmidrezaKarimi, “A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments”, Journal of Advances in Computer Network, Vol. 1, No. 3, September 2013.

Y. Chen and J.-F. Tu, “A Novel Cloud Computing Algorithm of Security and Privacy,” Mathematical Problems in Engineering, vol. 2013, pp. 1–6, 2013.

ABOUT THE AUTHORS

Ashima Narang has completed her B.Tech, M.Tech and is pursuing PhD in the field of computer Science from various prestigious institutes of India. She has published 16 research papers in reputed journals and conferences and has guided students for projects from undergraduate and graduate courses. She is also an active member in the various professional bodies like IAASSE, internet society, SCIEI etc. She is the reviewer to various journals from her expertise field.

Downloads

Published

2020-05-05

How to Cite

Analysis of Frameworks in Cloud Environment . (2020). International Journal of Innovative Research in Computer Science & Technology, 8(3), 251–254. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13316