Downloads: 108 | Views: 313
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.3 / 10
Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud
Kavitha K, Manjula R
Abstract: Cryptography in the field of information technology is an art to protect data privacy using standard mathematical techniques. Cloud computing, one of the emerging techniques to lease computing resources on demand, makes use of remote data storage where data owner does not possess direct control over her data. To protect privacy of users data and to enable user to verify integrity of the data stored on remote location, modern cryptographic techniques are used. So, if users paying awareness in selection of proper cryptographic scheme then it can achieve confidentiality without losing performance of Cloud. For Achieving high performance and security users can select any of modern encryption techniques. Here considering time and key difference to compare which algorithm is best in security and speed over the data. Data sharing being important functionality in cloud storage implements how to securely, efficiently, and flexibly share data with others. The public-key cryptosystems produce constant-size cipher texts that efficiently delegate the decryption rights for any set of cipher texts. The importance is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. The secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. The aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage.
Keywords: outsourced data, share data, authentication, Cryptography, data owner, encrypts data and Key aggregate cryptosystem KAC
Edition: Volume 5 Issue 5, May 2016
Pages: 1087 - 1091
DOI: https://www.doi.org/10.21275/NOV163525
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Dinesh Reddy Chittibala
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash