ANALYSIS OF ENCRYPTION ALGORITHMS FOR CLOUD SECURITY

Authors

  • Z.T Khudoykulov Tashkent university of information technologies named after Muhammad al- Khwarizmi
  • A.A Karimov Tashkent university of information technologies named after Muhammad al- Khwarizmi
  • I.S Olimov Tashkent university of information technologies named after Muhammad al- Khwarizmi

Keywords:

Cloud computing, Cryptography, Encryption, Decryption, Cipher Text, DES, TDES, AES, RSA, Homomorphic, IDEA, Blowfish.

Abstract

Cloud computing is the next big thing after internet in the field of Information technology. It is an Internet-based computing technology, in which software, Shared recourses and information are provided to consumers and devices on-demand, and as per user’s requirement on a pay per use model. Even though the cloud continues to grow in popularity, Usability and respectability, Problems with data protection and data privacy and other Security issues play a major setback in the field of Cloud Computing. Privacy and security are the key issue for cloud storage. Encryption is a well known technology for protecting sensitive data. This paper proposes a combined approach of Identity based and attribute based access policy for encryption technique of cloud storage which can be implementable on cloud platform. The report analyses the feasibility of the applying encryption algorithm for data security and privacy in cloud Storage with other existing algorithms.

References

Foster, I. T., Zhao, Y., Raicu, I., & Lu, S. (2009). Cloud Computing and Grid Computing 360- Degree Compared CoRR. abs/0901.0131.

H. Takabi, J.B.D. Joshi, and G-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security & Privacy, vol. 8, no. 6, 2010.

Kan Yang, Student Member, IEEE, and Xiaohua Jia, Fellow, IEEE “Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 7, JULY 2014.

Islam, KV Nasarul, and KV Mohamed Riyas. "Analysis of various encryption algorithms in cloud computing." International Journal of Computer Science and Mobile Computing 6.7 (2017): 90-97.

Salimbayevich O. I. et al. Internet of things architecture and security challenges //2020 International Conference on Information Science and Communications Technologies (ICISCT). – IEEE, 2020. – С. 1-4.

Liam Morris, “Analysis of Partially and Fully HIram Ahmad, Archana Khandekar, “Homomorphic Encryption Method Applied to Cloud Computing”, International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1519-1530.

Rizwan S., Zubair M. Basic Security Challenges in Cloud Computing //2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST). – IEEE, 2019. – С. 1-4.

Published

2023-05-30

How to Cite

Khudoykulov, Z., Karimov, A., & Olimov, I. (2023). ANALYSIS OF ENCRYPTION ALGORITHMS FOR CLOUD SECURITY. RESEARCH AND EDUCATION, 2(5), 371–378. Retrieved from https://researchedu.org/index.php/re/article/view/4018