Security algorithms for cloud based applications

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The concept of cloud computing provides various scalable resources and dynamic capacity of storage which performs operations on the internet. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in accessibility of data. Data protection is also one of the major concern of cloud computing and in order to provide the security to it’s users, cloud computing uses different cryptographic encryption algorithm. The main concern of this paper is to analyze which encryption algorithm will be most efficient and convenient to be used in cloud computing to secure data as well as less time consuming algorithm. Analysis have been done on different criteria like block size, key length, security and speed, encryption flow chart and decryption flow chart.

Cite

CITATION STYLE

APA

Shaheen, B., & Siddiqui, F. (2020). Security algorithms for cloud based applications. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 39, pp. 582–588). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-34515-0_60

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free