International Journal of advanced studies in Computer Science and Engineering

نویسندگان

  • Vineet Kumar Singh
  • Maitreyee Dutta
چکیده

Pay as per usage concept of Cloud computing has brought revolutionary changes in the information technology world. Cloud computing is now the need of changing technological scenario and even more service consumers are adopting it every day. One of the most fascinating features of cloud is that, from small scale to large scale, it is beneficial for all types of organizations. It has offered several advantages to the society, but at the same time many organizations are still reluctant towards the adoption of this technological innovation, and unfortunately the reason is true. The security concerns of cloud network are even increasing along with today’s growing cloud service consumers. These security concerns can be resolved by using proper security mechanism. In this paper we have analyzed the performance of some popular cryptographic algorithms for the cloud network, namely; Symmetric Algorithms, Asymmetric Algorithms, Hash algorithms and Homomorphic Algorithms. Homomorphic Algorithms are relatively newer than other categories, but these algorithms will be having wide application in near future, especially in the untrusted environment like cloud computing. We have conducted the comparative study in between two most popular algorithms of each category; AES vs. DES, RSA vs. ELGAMAL, MD5 vs. SHA, Paillier vs. Benaloh, so that performance wise better algorithms can be concluded for the cloud network. The algorithms are tested on the single system and on the cloud environment as well.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs

Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...

متن کامل

Cost Benefits Ratio of Organic Horticultural Products and Comparison with Conventional Products

Recently, the quality and safety of organic products is the topic of prime concern. While this demand increases since consumer considers organic products are healthier and harmless than conventional products. In the country like India, organic agricultural is not novel and are effectively performs in varied climates such as tribal mountains, mountainous areas and rain-fed zones of the country. ...

متن کامل

Cost Benefits Ratio of Organic Horticultural Products and Comparison with Conventional Products

Recently, the quality and safety of organic products is the topic of prime concern. While this demand increases since consumer considers organic products are healthier and harmless than conventional products. In the country like India, organic agricultural is not novel and are effectively performs in varied climates such as tribal mountains, mountainous areas and rain-fed zones of the country. ...

متن کامل

The Idea Of Using The Steganography As Encryption Tool

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Improving QoS in VANETs: A Survey

The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”. ITS integrates information, communications, computers and other technologies and uses them in the field of transportation to build an integrated system of people, roads ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014