scholarly journals A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms

Author(s):  
Hossein Abroshan
2014 ◽  
Vol 598 ◽  
pp. 691-694
Author(s):  
Lei Song ◽  
Jun Qin ◽  
Sheng Xi Liang ◽  
Xing Wang

With the rapid development of cloud computing, Security problems has become one of the major obstacle against it. In this paper, we present a hybrid encryption scheme based on the characteristics of RC5 and ECC encryption to deal with security issues caused by data residue in static storage and Save the storage space at the same time.


Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


Open Physics ◽  
2019 ◽  
Vol 17 (1) ◽  
pp. 128-134 ◽  
Author(s):  
Wei Ma ◽  
Huanqin Li ◽  
Deden Witarsyah

Abstract Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users. In this paper, together with characteristics of cloud computing, the separation issue in cloud computing has been analyzed from the perspective of information flow. The process of information flow in cloud computing systems is formalized to propose corresponding separation rules. These rules have been verified in this paper and it is shown that the rules conform to non-interference security, thus ensuring the security and practicability of the proposed rules.


2020 ◽  
Vol 33 (3) ◽  
pp. 133
Author(s):  
Deepak Garg ◽  
Jagpreet Sidhu ◽  
Shalli Rani

Author(s):  
Abdulhafid Bughari Abdulkarim Abdulgadr ◽  
Abdullah Khalifa Mohamed Hamad ◽  
Mansour Khalifa Hamad Mohamed

Sign in / Sign up

Export Citation Format

Share Document