CFP last date
20 May 2024
Reseach Article

A Survey on Various Cryptographic Algorithms for Security Enhancement

by Kranti M. Chaudhari, Megha V. Borole
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 7
Year of Publication: 2015
Authors: Kranti M. Chaudhari, Megha V. Borole
10.5120/19325-0574

Kranti M. Chaudhari, Megha V. Borole . A Survey on Various Cryptographic Algorithms for Security Enhancement. International Journal of Computer Applications. 110, 7 ( January 2015), 1-5. DOI=10.5120/19325-0574

@article{ 10.5120/19325-0574,
author = { Kranti M. Chaudhari, Megha V. Borole },
title = { A Survey on Various Cryptographic Algorithms for Security Enhancement },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 7 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number7/19325-0574/ },
doi = { 10.5120/19325-0574 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:41.952105+05:30
%A Kranti M. Chaudhari
%A Megha V. Borole
%T A Survey on Various Cryptographic Algorithms for Security Enhancement
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 7
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Systems can be used to enable data sharing capabilities and this is an abundant benefit to the user. As Cloud computing is a modern era computing technique that has a grater future and bringing a lot of benefit to the information technology. There are some security requirements when dealing with cloud storage. Cryptography is used to make sure that the data is protected. The various algorithms used for cryptography must fulfill the properties of confidentiality, authentication, availability, and integrity. In this paper, we have discussed on the data sharing services of cloud systems and surveyed on various cryptographic algorithms that are used during sharing data securely over the cloud.

References
  1. Mell P, Grance T (2012) The NIST definition of cloud computing. NIST Spec Publ 800:145. National Institute of Standards and Technology, U. S. Department of Commerce. Accessed on Oct 2012.
  2. Wikipedia definition of Cloud computing (2012). Source: http://en. wikipedia. org/wiki/Cloud_ computing. Accessed on Oct 2012
  3. HealeyM(2010) Why IT needs to push data sharing efforts. Information Week. Source: http://www. informationweek. com/services/integration/why-it-needs-to-push-data-sharing-effort/225700544. Accessed on Oct 2012
  4. Gellin A (2012) Facebook's benefits make it worthwhile. Buffalo News.
  5. Scale ME (2009) Cloud computing and collaboration. Library Hi Tech News, pp 10–13.
  6. Ratley N (2012) Data-sharing 'would benefit patients'. The Southland Times.
  7. Galvin N (2012) File-sharing service users in cloud over access to data. The Age.
  8. Prashanti. G, Deepthi. S & Sandhya Rani. K. "A Novel Approach for Data Encryption Standard Algorithm". International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-5, June 2013, pp. 264.
  9. Qing LIU, YunfeiLI,Tong LI, Lin HAO, "The Research of the Batch RSA Decryption Performance", Journal of Computational Information Systems 7:3 (2011) 948-955.
  10. Rajan S. Jamgekar, Geeta S. Joshi, "File Encryption and Decryption Using Secure RSA", International Journal of Emerging Science and Engineering (IJESE)ISSN: 2319–6378, Volume-1, Issue-4, February 2013.
  11. Melis RJF, Vehof H, Baars L, Rietveld MC (2011) Sharing of research data. Lancet 378(9808):1995.
  12. Feldman L, Patel D, Ortmann L, Robinson K, Popovic T (2012) Educating for the future: another important benefit of data sharing. Lancet 379(9829):1877–1878.
  13. What's in it for me? the benefits of sharing credit data (2011). Banker, Middle East.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Cryptographic Algorithm Data Sharing Security