{"title":"云计算中的混合密码算法综述","authors":"Sadiq Ahmad, A. Garko","doi":"10.1109/ICECCO48375.2019.9043254","DOIUrl":null,"url":null,"abstract":"it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Hybrid Cryptography Algorithms in Cloud Computing: A Review\",\"authors\":\"Sadiq Ahmad, A. Garko\",\"doi\":\"10.1109/ICECCO48375.2019.9043254\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.\",\"PeriodicalId\":166322,\"journal\":{\"name\":\"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCO48375.2019.9043254\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCO48375.2019.9043254","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hybrid Cryptography Algorithms in Cloud Computing: A Review
it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.