Abstract
<p>Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.</p>
Publisher
Institute of Advanced Engineering and Science
Subject
Electrical and Electronic Engineering,General Computer Science
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Randomized Round Crypto Security Encryption Standard for Secure Cloud Storage;Advances in Information Security, Privacy, and Ethics;2024-05-31
2. Exploring the Use of Applied Cryptography Algorithms for Preventing Data Leakage;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15
3. A hybrid approach to secure and compress data streams in cloud computing environment;Journal of King Saud University - Computer and Information Sciences;2024-03
4. Double Encryption Technique for Sharing and Storing the Images in the Cloud Environment;2024 Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT);2024-01-11
5. Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security;IEEE Access;2024