Analysis of Frameworks in Cloud Environment
Keywords:
RSA, ECC, Hybrid, Cloud Computing, EncryptionAbstract
Cloud is one of the advances, whose utilization is being expanded step by step for various purposes according to client's prerequisite. For the most part this innovation is utilized for capacity reason as a result of this, the clients need not to have any equipment stockpiling gadgets rather than that their information will be put away on the system. These frameworks must be increasingly secure with the goal that they give secrecy, protection and assurance for their consumer loyalty. Different calculations were created to make sure about cloud systems yet these calculations can't meet the prerequisites of the clients. In this paper, there is a comparison, of a hybrid approach and the individual algorithm to get the best results.
Downloads
References
Hongbing Wang and Zhenfu Cao, “A Fully Secure Unidirectional and Multi-use Proxy Re-encryption Scheme”, 2009.
N. Koblitz. Elliptic curve cryptosystems Mathematics of Computation, 48:203–209, 1987
V. Miller. Use of elliptic curves in cryptography .Advances in Cryptology—CRYPTO ’85 (LNCS 218) [483], 417–426, 1986
A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” In :Advances in Cryptology - Proceedings of CRYPTO'84, Lecture Notes of Computer Science (LNCS), vol.196, pp.47-53, 1985
M. Preetha, “A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM”, International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 6, June 2013, pg.126 – 139.
G.Prabu kanna, “Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) – 2016, pp. 3688-3693
A. D. Gupta, “Comparative Analysis of Various Cloud Security Frameworks”, International Conference on cyber security and privacy in communication networks (ICCS-2018), pp. 379-384.
D.Boneh, M.Franklin, Identity-based encryption from the weil pairing, Advances in Cryptology–CRYPTO2001, SantaBarbara, California,USA, LNCS, 2139, Springer, Berlin, 2001.
FarazFatemiMoghaddam, Maen T. Alrashdan, and OmidrezaKarimi, “A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments”, Journal of Advances in Computer Network, Vol. 1, No. 3, September 2013.
Y. Chen and J.-F. Tu, “A Novel Cloud Computing Algorithm of Security and Privacy,” Mathematical Problems in Engineering, vol. 2013, pp. 1–6, 2013.
ABOUT THE AUTHORS
Ashima Narang has completed her B.Tech, M.Tech and is pursuing PhD in the field of computer Science from various prestigious institutes of India. She has published 16 research papers in reputed journals and conferences and has guided students for projects from undergraduate and graduate courses. She is also an active member in the various professional bodies like IAASSE, internet society, SCIEI etc. She is the reviewer to various journals from her expertise field.