V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma
{"title":"加密技术性能评估及云端加密数据上传","authors":"V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma","doi":"10.1109/ICCCNT.2013.6726514","DOIUrl":null,"url":null,"abstract":"Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Security is a foremost important issue for data in cloud. To look after the data from cloud data storage we store the encrypted data in cloud environment. For encrypting the data we use different types of encryption methods like RSA, SHA1, and MD5. Further we also measure the performance of the different encrypted techniques based on the Key size of each encrypted technique to upload data in to the cloud by providing the best way security to data.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"24 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Performance evaluation of encryption techniques and uploading of encrypted data in cloud\",\"authors\":\"V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma\",\"doi\":\"10.1109/ICCCNT.2013.6726514\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Security is a foremost important issue for data in cloud. To look after the data from cloud data storage we store the encrypted data in cloud environment. For encrypting the data we use different types of encryption methods like RSA, SHA1, and MD5. Further we also measure the performance of the different encrypted techniques based on the Key size of each encrypted technique to upload data in to the cloud by providing the best way security to data.\",\"PeriodicalId\":6330,\"journal\":{\"name\":\"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"volume\":\"24 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2013.6726514\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2013.6726514","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance evaluation of encryption techniques and uploading of encrypted data in cloud
Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Security is a foremost important issue for data in cloud. To look after the data from cloud data storage we store the encrypted data in cloud environment. For encrypting the data we use different types of encryption methods like RSA, SHA1, and MD5. Further we also measure the performance of the different encrypted techniques based on the Key size of each encrypted technique to upload data in to the cloud by providing the best way security to data.