8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) 2013
DOI: 10.1109/icitst.2013.6750258
|View full text |Cite
|
Sign up to set email alerts
|

A comparative study between modern encryption algorithms based on cloud computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The extensive analysis of the CloudJS algorithm concerning parameters and other cloud encryption algorithm (AES and DES) shows the following advantages: The ratio of plain text file size to ciphertext file size generated during the encryption process of the cloud states that there is not much overhead generated when the encrypted file is stored onto the cloud. The ideal characteristics of a cloud encryption algorithm must be lightweight but appropriately complex so that it is difficult to crack the file through brute force attack (Omer K. Jasim Mohammad et al , 2013). Choosing the principle random value in a cloud algorithm is one of the essential steps of encryption.…”
Section: Results and Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…The extensive analysis of the CloudJS algorithm concerning parameters and other cloud encryption algorithm (AES and DES) shows the following advantages: The ratio of plain text file size to ciphertext file size generated during the encryption process of the cloud states that there is not much overhead generated when the encrypted file is stored onto the cloud. The ideal characteristics of a cloud encryption algorithm must be lightweight but appropriately complex so that it is difficult to crack the file through brute force attack (Omer K. Jasim Mohammad et al , 2013). Choosing the principle random value in a cloud algorithm is one of the essential steps of encryption.…”
Section: Results and Analysismentioning
confidence: 99%
“…The ratio of plain text file size to ciphertext file size generated during the encryption process of the cloud states that there is not much overhead generated when the encrypted file is stored onto the cloud. The ideal characteristics of a cloud encryption algorithm must be lightweight but appropriately complex so that it is difficult to crack the file through brute force attack (Omer K. Jasim Mohammad et al , 2013).…”
Section: Results and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Dimitrios et al was the first to propose the use of cryptography to secure cloud architecture [10]. Ever since, many authors proposed to use cryptographic algorithms in the cloud storage [11] [12]. But, these solutions remain…”
mentioning
confidence: 99%