云计算中的混合密码算法综述

Sadiq Ahmad, A. Garko
{"title":"云计算中的混合密码算法综述","authors":"Sadiq Ahmad, A. Garko","doi":"10.1109/ICECCO48375.2019.9043254","DOIUrl":null,"url":null,"abstract":"it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Hybrid Cryptography Algorithms in Cloud Computing: A Review\",\"authors\":\"Sadiq Ahmad, A. Garko\",\"doi\":\"10.1109/ICECCO48375.2019.9043254\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.\",\"PeriodicalId\":166322,\"journal\":{\"name\":\"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCO48375.2019.9043254\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCO48375.2019.9043254","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

据观察,大多数人和公司都在向云迁移,因为云更便宜、更方便。对于一些电脑用户来说,找到足够的存储空间来容纳他们获得的所有数据是一个真正的挑战。正因为如此,人们往往会购买大量的数据或更大的空间的硬盘驱动器,仍然面临着存储空间的挑战。有了这种新的云计算技术,人们发现在云上购买大量空间变得更加容易,这种云是指将数据保存到由第三方维护的异地存储系统中。由于所有这些,云用户开始考虑存储在这些由第三方管理的服务器上的数据的安全性,担心数据泄露。为了减少这种数据泄露和许多数据威胁,信息安全是必要的。密码学在信息安全中起着重要的作用。为了向云存储提供安全性,用户使用混合加密而不是单一加密算法。本文从2015年到2019年初对混合密码学进行了研究。本研究检索了与该问题相关的论文,在过滤的基础上考虑了大约20篇。其中,8个是基于用户友好的表格调查,12个是深度调查。本文的主要目的是为密码学领域的新研究者、学生和没有经验的人提供更多的信息。发现的研究不足是忽略用户认证和混合算法实现不当。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Hybrid Cryptography Algorithms in Cloud Computing: A Review
it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信