CFP last date
20 May 2024
Reseach Article

Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment

by Krunal Suthar, Parmalik Kumar, Hitesh Gupta, Hiren Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 19
Year of Publication: 2012
Authors: Krunal Suthar, Parmalik Kumar, Hitesh Gupta, Hiren Patel
10.5120/9807-3054

Krunal Suthar, Parmalik Kumar, Hitesh Gupta, Hiren Patel . Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment. International Journal of Computer Applications. 60, 19 ( December 2012), 16-19. DOI=10.5120/9807-3054

@article{ 10.5120/9807-3054,
author = { Krunal Suthar, Parmalik Kumar, Hitesh Gupta, Hiren Patel },
title = { Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 19 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number19/9807-3054/ },
doi = { 10.5120/9807-3054 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:24.432850+05:30
%A Krunal Suthar
%A Parmalik Kumar
%A Hitesh Gupta
%A Hiren Patel
%T Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 19
%P 16-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography in the field of information technology is an art to protect data privacy using standard mathematical techniques. Cloud computing, one of the emerging techniques to lease computing resources on demand, makes use of remote data storage where data owner does not possess direct control over her data. To protect privacy of users' data and to enable user to verify integrity of the data stored on remote location, modern cryptographic techniques are used. Cryptographic techniques impose computational and communication overhead which in turn affect the performance of the overall operation. In this research article, we analyze two broad categories of cryptography viz. symmetric key encryption and encoding. We analyze various algorithms and compare them on the basis of security and performance perspectives. We further make recommendations for Cloud users to protect & verify their sensitive data using one of these cryptographic techniques.

References
  1. Shashi Mehrotra Seth, Rajan Mishra "Comparative Analysis Of Encryption Algorithms For Data Communication" In IJCST Vol. 2, Issue 2, June 2011.
  2. S. Hirani, "Energy Consumption of Encryption schemes in wireless device" Thesis, university of Pittsburgh, Retrieved Oct. 1, 2008.
  3. A. Nadeem, "A performance comparison of data encryption algorithms", IEEE information and communication technologies, 2006.
  4. Anoop MS, "Public key Cryptography (Applications Algorithm and Mathematical Explanations)"
  5. Diaasalama AbdElminaam, Hatem Mohamad Abdual Kader, Mohly Mohamed Hadhoud, "Evalution the Performance of Symmetric Encryption Algorithms", In IJNS May 2010.
  6. Erik Olson, Woojin Yu, "Encryption for Mobile Computing".
  7. Neetu Settia. "Cryptanalysis of modern Cryptography Algorithms". In IJCST. 2010.
  8. http://www. javamex. com/tutorials/cryptograp- hy/ciphers. shtml.
  9. Hamdan. O. Alanazi, B. B. Zaidan, A. A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani "New Comparative Study Between DES, Triple DES and AES within Nine Factors" In JOURNAL OF COMPUTING, 2010.
  10. Ayushi "A Symmetric Key Cryptographic Algorithm" In International Journal of Computer Applications 2012.
  11. Priya Dhawan. , "Performance Comparison: Security Design Choices," Microsoft Developer Network October 2002.
  12. basics of cryptography, fisher. osu. edu /~muhanna_1/pdf/crypto. pdf.
  13. Schneier, B. (1996), "Applied Cryptography", Wiley & Sons, p. 399.
  14. M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, M. Wiener, "Minimal key lengths for symmetric ciphers to provide adequate commercial security" January 1996.
  15. Monika Agrawal "A Comparative Survey on Symmetric Key Encryption Techniques "In International Journal on Computer Science and Engineering (IJCSE) Vol. 4 No. 05 May 201 2.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Security Privacy Encryption Encoding Performance