Gaganpreet Kaur, B. N, Murugesan S, Pradeepa K, S. G., Vinoth Kumar M
{"title":"基于云计算的高效AES安全模型与安全性能权衡分析","authors":"Gaganpreet Kaur, B. N, Murugesan S, Pradeepa K, S. G., Vinoth Kumar M","doi":"10.1109/ICECCT56650.2023.10179752","DOIUrl":null,"url":null,"abstract":"Cloud computing is awesome progress the information technology. It allows users to store a large amount of data on a remote storage location and access files, software, and services through their internet connection on the personal computer based on the pay-per-use model. End-users mostly use the cloud for storing information on the cloud, sharing files, and data backup. In fact, according to the flex era 2021 state of cloud report, roughly 90 % of enterprises anticipate cloud users have been expanded because of COVID-19. Data security and privacy are basic concerns because of the nature of storing unencrypted cloud computing. Though many encryption standards are being used to make crucial information safe, single encryption is not able to cope with fast computing systems. To circumvent the threats, this paper uses a triple encryption approach before porting on a cloud with a hash value to deliver the data integrity, confidentiality, and non-repudiation. This solution is designed to offer complete data security to the data throughout the data life cycle, such as to data in transit, and data in storage. Subsequently, Improved AES achieves better optimization over AES. Moreover, the security and performance analysis of the proposed approach with the existing approaches assist to find the best security performance trade-off.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Security model with efficient AES and Security Performance Trade-off Analysis of Cryptography Systems with Cloud Computing\",\"authors\":\"Gaganpreet Kaur, B. N, Murugesan S, Pradeepa K, S. G., Vinoth Kumar M\",\"doi\":\"10.1109/ICECCT56650.2023.10179752\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is awesome progress the information technology. It allows users to store a large amount of data on a remote storage location and access files, software, and services through their internet connection on the personal computer based on the pay-per-use model. End-users mostly use the cloud for storing information on the cloud, sharing files, and data backup. In fact, according to the flex era 2021 state of cloud report, roughly 90 % of enterprises anticipate cloud users have been expanded because of COVID-19. Data security and privacy are basic concerns because of the nature of storing unencrypted cloud computing. Though many encryption standards are being used to make crucial information safe, single encryption is not able to cope with fast computing systems. To circumvent the threats, this paper uses a triple encryption approach before porting on a cloud with a hash value to deliver the data integrity, confidentiality, and non-repudiation. This solution is designed to offer complete data security to the data throughout the data life cycle, such as to data in transit, and data in storage. Subsequently, Improved AES achieves better optimization over AES. Moreover, the security and performance analysis of the proposed approach with the existing approaches assist to find the best security performance trade-off.\",\"PeriodicalId\":180790,\"journal\":{\"name\":\"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCT56650.2023.10179752\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCT56650.2023.10179752","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Security model with efficient AES and Security Performance Trade-off Analysis of Cryptography Systems with Cloud Computing
Cloud computing is awesome progress the information technology. It allows users to store a large amount of data on a remote storage location and access files, software, and services through their internet connection on the personal computer based on the pay-per-use model. End-users mostly use the cloud for storing information on the cloud, sharing files, and data backup. In fact, according to the flex era 2021 state of cloud report, roughly 90 % of enterprises anticipate cloud users have been expanded because of COVID-19. Data security and privacy are basic concerns because of the nature of storing unencrypted cloud computing. Though many encryption standards are being used to make crucial information safe, single encryption is not able to cope with fast computing systems. To circumvent the threats, this paper uses a triple encryption approach before porting on a cloud with a hash value to deliver the data integrity, confidentiality, and non-repudiation. This solution is designed to offer complete data security to the data throughout the data life cycle, such as to data in transit, and data in storage. Subsequently, Improved AES achieves better optimization over AES. Moreover, the security and performance analysis of the proposed approach with the existing approaches assist to find the best security performance trade-off.