Key-enforced access control and performance analysis of DES and RSA cryptography in cloud computing

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing has been one of the most popular technologies in Information and Communication Technology the last few years. One of the main obstacles for its adoption is the sensitivity of insecurity and privacy violation. Protecting sensitive and high-value data within a cloud system necessitates the use of cryptographic techniques and cryptographic keys. Management of these keys is especially challenging in cloud environments due to the expanded exposure to various insider and outsider threat agents. However, it makes it difficult for data owners to resort to the cloud provider for updating the access control policy when the cooperative relationship changes. Key-enforced cloud access control guarantees the cloud users will outsource their data without outsourcing the control, since the user possesses the key rather than the cloud provider. In this manuscript we analyze the encryption and decryption time for DES, 2DES, RSA & Modified RSA (MDRSA) algorithms.

Cite

CITATION STYLE

APA

Kumar, Y. K., & Shafi, R. M. (2019). Key-enforced access control and performance analysis of DES and RSA cryptography in cloud computing. International Journal of Engineering and Advanced Technology, 9(1), 7220–7225. https://doi.org/10.35940/ijeat.A9995.109119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free