{"title":"Comparative Analysis of Security Algorithms used in Cloud Computing","authors":"Mohd Tajammul, R. Parveen, I. Tayubi","doi":"10.1109/INDIACom51348.2021.00157","DOIUrl":null,"url":null,"abstract":"Cloud computing is a technique that enables the users to access applications to infrastructure through subscription methods on remote location. Cloud computing, being collective technique, possesses features of various technologies like Virtual Private Network (VPN), distributed technology, parallel computing, grid computing as well as ubiquitous computing. Cloud storage is the infrastructure offered by the cloud computing in order to facilitate users to upload and access their data on cloud space. Due to multitenancy of cloud storage, the data uploaded on it is the more prone to security breaches. To secure the data on cloud, cryptographic technique is used which works like safeguard against data leakage. This research work focuses on cryptographic algorithms from most basic to advance and also presents their comparative analysis. Moreover, the paper focuses on the nature of the algorithms in context of cloud that is homogeneous and heterogeneous nature. In the cloud computing, homogeneous nature algorithm is used only if the encryptors and decryptors both are same while heterogeneous refers to the situation in which encryptors and decryptors are different entities.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIACom51348.2021.00157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Cloud computing is a technique that enables the users to access applications to infrastructure through subscription methods on remote location. Cloud computing, being collective technique, possesses features of various technologies like Virtual Private Network (VPN), distributed technology, parallel computing, grid computing as well as ubiquitous computing. Cloud storage is the infrastructure offered by the cloud computing in order to facilitate users to upload and access their data on cloud space. Due to multitenancy of cloud storage, the data uploaded on it is the more prone to security breaches. To secure the data on cloud, cryptographic technique is used which works like safeguard against data leakage. This research work focuses on cryptographic algorithms from most basic to advance and also presents their comparative analysis. Moreover, the paper focuses on the nature of the algorithms in context of cloud that is homogeneous and heterogeneous nature. In the cloud computing, homogeneous nature algorithm is used only if the encryptors and decryptors both are same while heterogeneous refers to the situation in which encryptors and decryptors are different entities.