International Journal of Innovative Research in Engineering and Management
Year: 2020, Volume: 8, Issue: 3
First page : ( 251) Last page : ( 254)
Online ISSN : 2350-0557.
DOI: 10.21276/ijircst.2020.8.3.38 |
DOI URL: https://doi.org/10.21276/ijircst.2020.8.3.38
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Ashima Narang
Cloud is one of the advances, whose utilization is being expanded step by step for various purposes according to client's prerequisite. For the most part this innovation is utilized for capacity reason as a result of this, the clients need not to have any equipment stockpiling gadgets rather than that their information will be put away on the system. These frameworks must be increasingly secure with the goal that they give secrecy, protection and assurance for their consumer loyalty. Different calculations were created to make sure about cloud systems yet these calculations can't meet the prerequisites of the clients. In this paper, there is a comparison, of a hybrid approach and the individual algorithm to get the best results.
1] Hongbing Wang and Zhenfu Cao, “A Fully Secure Unidirectional and Multi-use Proxy Re-encryption Scheme”, 2009.
[2] N. Koblitz. Elliptic curve cryptosystems Mathematics of Computation, 48:203–209, 1987
[3] V. Miller. Use of elliptic curves in cryptography .Advances in Cryptology—CRYPTO ’85 (LNCS 218) [483], 417–426, 1986
[4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” In :Advances in Cryptology - Proceedings of CRYPTO'84, Lecture Notes of Computer Science (LNCS), vol.196, pp.47-53, 1985
[5] M. Preetha, “A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM”, International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 6, June 2013, pg.126 – 139.
[6] G.Prabu kanna, “Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) – 2016, pp. 3688-3693
[7] A. D. Gupta, “Comparative Analysis of Various Cloud Security Frameworks”, International Conference on cyber security and privacy in communication networks (ICCS-2018), pp. 379-384.
[8] D.Boneh, M.Franklin, Identity-based encryption from the weil pairing, Advances in Cryptology–CRYPTO2001, SantaBarbara, California,USA, LNCS, 2139, Springer, Berlin, 2001.
[9] FarazFatemiMoghaddam, Maen T. Alrashdan, and OmidrezaKarimi, “A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments”, Journal of Advances in Computer Network, Vol. 1, No. 3, September 2013.
[10] Y. Chen and J.-F. Tu, “A Novel Cloud Computing Algorithm of Security and Privacy,” Mathematical Problems in Engineering, vol. 2013, pp. 1–6, 2013.
Assistant Professor, Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University Haryana, Gurugram, India, +91-7087780777, (e-mail: ashimanarang04@gamil.com).
No. of Downloads: 47 | No. of Views: 1433
Rubeel Taj, Aaftab Alam, Falak Alam, Mohd Haroon.
January 2025 - Vol 13, Issue 1
Anshjyot Singh Wadhwa.
September 2024 - Vol 12, Issue 5
Mohammad Hashir, Sanskar Mishra, Yojna Arora, Avinash Kumar Sharma.
September 2024 - Vol 12, Issue 5