Abstract
The cloud is becoming a hub for sensitive data as technology develops, making it increasingly vulnerable, especially as more people get access. Data should be protected and secured since a larger number of individuals utilize the cloud for a variety of purposes. Confidentiality and privacy of data is attained through the use of cryptographic techniques. While each cryptographic method completes the same objective, they all employ different amounts of CPU, memory, throughput, encryption, and decryption times. It is necessary to contrast the various possibilities in order to choose the optimal cryptographic algorithm. An integrated data size of 5n*102 (KB (∈ 1,2,4,10,20,40) is evaluated in this article. Performance metrics including run time, memory use, and throughput time were used in the comparison. To determine the effectiveness of each cryptographic technique, the data sizes were run fifteen (15) times, and the mean simulation results were then reported. In terms of run time trend, NCS is superior to the other algorithms according to Friedman’s test and Bonferroni’s Post Hoc test.
Publisher
Public Library of Science (PLoS)
Reference56 articles.
1. M. Tajammul, R. Parveen and I. A. Tayubi, "Comparative Analysis of Security Algorithms used in Cloud Computing," 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), 2021, pp. 875–880.
2. Improvement of job completion time in data-intensive cloud computing applications;I. A. Ibrahim;Journal of Cloud Computing,2020
3. Secure Cloud Data Storage System using Hybrid Paillier-Blowfish Algorithm;B. Seth;Computers, Materials & Continua,2021
4. Analyzing CSP Trustworthiness and Predicting Cloud Service Performance;R. Maeser;IEEE Open Journal of the Computer Society,2020
5. The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges-A Systematic Literature Review (SLR);J. Hassan;Computational intelligence and neuroscience,2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献