2020
DOI: 10.11591/ijeecs.v20.i1.pp521-527
|View full text |Cite
|
Sign up to set email alerts
|

Improved cloud data transfer security using hybrid encryption algorithm

Abstract: Cloud computing is a model of sophisticated computing which has a strong effect on data innovation. Cloud computing offers remote access to shared computerized assets in the stored cloud. Operationally cloud servers utilize Web services that give enormus advantage to the user in a variety of applications such as banking and finance, storage, social networking and e-mail. Cloud computing accomplishes many of the features interrelated to elasticity, ease of utility, efficiency and performance with low cost.  The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…One-way encryption that cannot be reversed is adopted for passwords and other authentication information. (2) Data file encryption [12]: to prevent the illegal acquisition of reported information, all reported data files must be encrypted with file encryption software based on the RSA encryption algorithm, and the downloaded data files must be decrypted with a private key. (3) Data storage security [13]: data related to the reported content is encrypted and stored in the database to prevent data leakage caused by database security or internal personnel violations.…”
Section: System Safety Designmentioning
confidence: 99%
“…One-way encryption that cannot be reversed is adopted for passwords and other authentication information. (2) Data file encryption [12]: to prevent the illegal acquisition of reported information, all reported data files must be encrypted with file encryption software based on the RSA encryption algorithm, and the downloaded data files must be decrypted with a private key. (3) Data storage security [13]: data related to the reported content is encrypted and stored in the database to prevent data leakage caused by database security or internal personnel violations.…”
Section: System Safety Designmentioning
confidence: 99%
“…The application of symmetric keys uses a simple symmetric algorithm, and the application of asymmetric keys uses the RSA algorithm, based on two mathematical problems, namely number factorization and modulo operations. The application of this algorithm produces two different keys but connected mathematically [22]. The key for the encryption process is known as the public key and the key used for decryption is the private key.…”
Section: Proposed Hybrid Algorithmmentioning
confidence: 99%
“…It is a symmetric-key block cipher [18]. The key length of AES varying between 128, 192, and 256 bits [19]. AES handles 128-bit form plaintext blocks [20].…”
Section: Advanced Encryption Standard (Aes)mentioning
confidence: 99%