云存储数据安全中的加密算法比较研究

K. Rajalakshmi, K. Ramesh, P. Renjith
{"title":"云存储数据安全中的加密算法比较研究","authors":"K. Rajalakshmi, K. Ramesh, P. Renjith","doi":"10.1109/CONIT55038.2022.9847982","DOIUrl":null,"url":null,"abstract":"Cloud computing plays a vital role in this technical world. Users can access cloud computing services through an internet connection. We store any amount of data in the cloud in various of formats like image, visual, audio, text etc. The main reason for using the cloud is that the user can store data and access it from anywhere and at any time. Storing the data in cloud is very simple but it is very important to notice that they and secure. To keep data, secure in the cloud, several cryptographic algorithms have been introduced. This paper compares and contrasts different cryptographic algorithms that are used to preserve data in the cloud and focus on three major algorithms. To make the analysis and comparison, a simulation program was designed, and the results show that AES is a best method in terms of computation time, memory consumption, and level of security.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"33 2 Pt 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Comparative Study of Cryptographic Algorithms in cloud storage data security\",\"authors\":\"K. Rajalakshmi, K. Ramesh, P. Renjith\",\"doi\":\"10.1109/CONIT55038.2022.9847982\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing plays a vital role in this technical world. Users can access cloud computing services through an internet connection. We store any amount of data in the cloud in various of formats like image, visual, audio, text etc. The main reason for using the cloud is that the user can store data and access it from anywhere and at any time. Storing the data in cloud is very simple but it is very important to notice that they and secure. To keep data, secure in the cloud, several cryptographic algorithms have been introduced. This paper compares and contrasts different cryptographic algorithms that are used to preserve data in the cloud and focus on three major algorithms. To make the analysis and comparison, a simulation program was designed, and the results show that AES is a best method in terms of computation time, memory consumption, and level of security.\",\"PeriodicalId\":270445,\"journal\":{\"name\":\"2022 2nd International Conference on Intelligent Technologies (CONIT)\",\"volume\":\"33 2 Pt 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Intelligent Technologies (CONIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONIT55038.2022.9847982\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT55038.2022.9847982","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

云计算在这个技术世界中扮演着至关重要的角色。用户可以通过互联网连接访问云计算服务。我们在云中以各种格式存储任意数量的数据,如图像、视觉、音频、文本等。使用云的主要原因是用户可以随时随地存储和访问数据。将数据存储在云中非常简单,但注意它们的安全性非常重要。为了保证云中的数据安全,引入了几种加密算法。本文比较和对比了用于在云中保存数据的不同加密算法,并重点介绍了三种主要算法。为了进行分析和比较,设计了一个仿真程序,结果表明AES在计算时间、内存消耗和安全性方面都是最好的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Comparative Study of Cryptographic Algorithms in cloud storage data security
Cloud computing plays a vital role in this technical world. Users can access cloud computing services through an internet connection. We store any amount of data in the cloud in various of formats like image, visual, audio, text etc. The main reason for using the cloud is that the user can store data and access it from anywhere and at any time. Storing the data in cloud is very simple but it is very important to notice that they and secure. To keep data, secure in the cloud, several cryptographic algorithms have been introduced. This paper compares and contrasts different cryptographic algorithms that are used to preserve data in the cloud and focus on three major algorithms. To make the analysis and comparison, a simulation program was designed, and the results show that AES is a best method in terms of computation time, memory consumption, and level of security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信