Skip to main content

2022 | OriginalPaper | Buchkapitel

Implementing the Comparative Analysis of AES and DES Crypt Algorithm in Cloud Computing

verfasst von : R. S. Reshma, P. P. Anjusha, G. S. Anisha

Erschienen in: Computer Networks and Inventive Communication Technologies

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing helps users to access information over the internet. Efficiency, scalability and resource consumption are all optimized in cloud computing. Data security is an important concern in cloud computing that can be addressed with cryptography. Cryptography can be defined as a measure to protect confidential information that must be protected from others who are not intended to be viewed in the same way. The use of cryptography is widespread from small schools and colleges to the social media platform that we addicted to. AES and DES cryptographic algorithms are the main concern of this paper and also implementing which algorithm is best in the basis of time and also comparing the differences between these two algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kannan, M., Priya, C., VaishnaviSree, S.: A comparative analysis of DES, AES and RSA crypt algorithms for network security in cloud computing. J. Emerg. Technol. Innovative Res. (JETIR) 6(3) (2019) Kannan, M., Priya, C., VaishnaviSree, S.: A comparative analysis of DES, AES and RSA crypt algorithms for network security in cloud computing. J. Emerg. Technol. Innovative Res. (JETIR) 6(3) (2019)
2.
Zurück zum Zitat Khan, S.K., Tuteja, R.R.: Security in cloud computing using cryptographic algorithms. Int. J. Innovative Res. Compute Commun. Eng. 3(1) (2015) Khan, S.K., Tuteja, R.R.: Security in cloud computing using cryptographic algorithms. Int. J. Innovative Res. Compute Commun. Eng. 3(1) (2015)
3.
Zurück zum Zitat Hossain, M.A., Hossain, M.B., Uddin, M.S., Imtiaz, S.M.: Performance analysis of different cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3) (2016) Hossain, M.A., Hossain, M.B., Uddin, M.S., Imtiaz, S.M.: Performance analysis of different cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3) (2016)
4.
Zurück zum Zitat Kalpana, P., Singaraju, S.: Data security in cloud computing using RSA algorithm. Int. J. Res. Comput. Commun. Technol. (IJRCCT) 1(4). ISSN 2278–5841 (2012) Kalpana, P., Singaraju, S.: Data security in cloud computing using RSA algorithm. Int. J. Res. Comput. Commun. Technol. (IJRCCT) 1(4). ISSN 2278–5841 (2012)
5.
Zurück zum Zitat Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6) (2012) Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6) (2012)
6.
Zurück zum Zitat Albgumi, A., Alassafi, M.O., Walters, R., Wills, G.: Data security in cloud computing. In: Fifth International Conference on Future Generation Communication Technologies (2016) Albgumi, A., Alassafi, M.O., Walters, R., Wills, G.: Data security in cloud computing. In: Fifth International Conference on Future Generation Communication Technologies (2016)
7.
Zurück zum Zitat Sugumran, M., Murugan, B.B., kamalraj, D.: An architecture for data security in cloud computing. In: 2014 World Congress on Computing and Communication Technologies, pp. 252–255 (2014) Sugumran, M., Murugan, B.B., kamalraj, D.: An architecture for data security in cloud computing. In: 2014 World Congress on Computing and Communication Technologies, pp. 252–255 (2014)
8.
Zurück zum Zitat Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Privacy 7(4), 61–64 (2009) Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Privacy 7(4), 61–64 (2009)
9.
Zurück zum Zitat Rihan, S.D., Khalid, A., Osman, S.E.F.: A performance comparison of encryption algorithms AES and DES. Int. J. Eng. Res. Technol. (IJERT) 4(12), 151–154 (2015) Rihan, S.D., Khalid, A., Osman, S.E.F.: A performance comparison of encryption algorithms AES and DES. Int. J. Eng. Res. Technol. (IJERT) 4(12), 151–154 (2015)
10.
Zurück zum Zitat Bhat, B., Ali, A.W., Gupta, A.: DES and AES performance evaluation. In: International Conference on Computing, Communication and Automation (2015) Bhat, B., Ali, A.W., Gupta, A.: DES and AES performance evaluation. In: International Conference on Computing, Communication and Automation (2015)
11.
Zurück zum Zitat Mandal, A.K., Prakash, C., Tiwari, A.: Performance evaluation of cryptographic algorithms: DES and AES. In: 2012 IEEE Students’ Conference on Electrical Electronics and Computer Science (2012) Mandal, A.K., Prakash, C., Tiwari, A.: Performance evaluation of cryptographic algorithms: DES and AES. In: 2012 IEEE Students’ Conference on Electrical Electronics and Computer Science (2012)
12.
Zurück zum Zitat Arora, R.,Parashar, A.: Secure user data in cloud computing using encryption al gorithms. Int. J. Eng. Res. Appl. (2013) Arora, R.,Parashar, A.: Secure user data in cloud computing using encryption al gorithms. Int. J. Eng. Res. Appl. (2013)
13.
Zurück zum Zitat Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Global J Comput. Sci. Technol. (2013) Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Global J Comput. Sci. Technol. (2013)
Metadaten
Titel
Implementing the Comparative Analysis of AES and DES Crypt Algorithm in Cloud Computing
verfasst von
R. S. Reshma
P. P. Anjusha
G. S. Anisha
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-3728-5_24

Neuer Inhalt