{"title":"云存储数据安全中的加密算法比较研究","authors":"K. Rajalakshmi, K. Ramesh, P. Renjith","doi":"10.1109/CONIT55038.2022.9847982","DOIUrl":null,"url":null,"abstract":"Cloud computing plays a vital role in this technical world. Users can access cloud computing services through an internet connection. We store any amount of data in the cloud in various of formats like image, visual, audio, text etc. The main reason for using the cloud is that the user can store data and access it from anywhere and at any time. Storing the data in cloud is very simple but it is very important to notice that they and secure. To keep data, secure in the cloud, several cryptographic algorithms have been introduced. This paper compares and contrasts different cryptographic algorithms that are used to preserve data in the cloud and focus on three major algorithms. To make the analysis and comparison, a simulation program was designed, and the results show that AES is a best method in terms of computation time, memory consumption, and level of security.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"33 2 Pt 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Comparative Study of Cryptographic Algorithms in cloud storage data security\",\"authors\":\"K. Rajalakshmi, K. Ramesh, P. Renjith\",\"doi\":\"10.1109/CONIT55038.2022.9847982\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing plays a vital role in this technical world. Users can access cloud computing services through an internet connection. We store any amount of data in the cloud in various of formats like image, visual, audio, text etc. The main reason for using the cloud is that the user can store data and access it from anywhere and at any time. Storing the data in cloud is very simple but it is very important to notice that they and secure. To keep data, secure in the cloud, several cryptographic algorithms have been introduced. This paper compares and contrasts different cryptographic algorithms that are used to preserve data in the cloud and focus on three major algorithms. To make the analysis and comparison, a simulation program was designed, and the results show that AES is a best method in terms of computation time, memory consumption, and level of security.\",\"PeriodicalId\":270445,\"journal\":{\"name\":\"2022 2nd International Conference on Intelligent Technologies (CONIT)\",\"volume\":\"33 2 Pt 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Intelligent Technologies (CONIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONIT55038.2022.9847982\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT55038.2022.9847982","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative Study of Cryptographic Algorithms in cloud storage data security
Cloud computing plays a vital role in this technical world. Users can access cloud computing services through an internet connection. We store any amount of data in the cloud in various of formats like image, visual, audio, text etc. The main reason for using the cloud is that the user can store data and access it from anywhere and at any time. Storing the data in cloud is very simple but it is very important to notice that they and secure. To keep data, secure in the cloud, several cryptographic algorithms have been introduced. This paper compares and contrasts different cryptographic algorithms that are used to preserve data in the cloud and focus on three major algorithms. To make the analysis and comparison, a simulation program was designed, and the results show that AES is a best method in terms of computation time, memory consumption, and level of security.