期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Secure Cloud Data Storage System Using Hybrid Paillier–Blowsh Algorith
1
作者 Bijeta Seth Surjeet Dalal +6 位作者 Dac-Nhuong Le Vivek Jaglan Neeraj Dahiya Akshat Agrawal Mayank Mohan Sharma Deo Prakash k.d.verma 《Computers, Materials & Continua》 SCIE EI 2021年第4期779-798,共20页
Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically recongured in order to deliver optimum resource utilization by exploiting the pay-per-use model.... Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically recongured in order to deliver optimum resource utilization by exploiting the pay-per-use model.However,concerns around security have been an impediment in the extensive adoption of the cloud computing model.In this regard,advancements in cryptography,accelerated by the wide usage of the internet worldwide,has emerged as a key area in addressing some of these security concerns.In this document,a hybrid cryptographic protocol deploying Blowsh and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption Standard(AES)and Rivest Shamir Adleman(RSA)techniques.Algorithms for secure data storage protocol in two phases have been presented.The proposed hybrid protocol endeavors to improve the power of cloud storage through a decrease in computation time and ciphertext size.Simulations have been carried out with Oracle Virtual Box and Fog server used on an Ubuntu 16.04 platform.This grouping of asymmetric and homomorphic procedures has demonstrated enhanced security.Compression usage has helped in decreasing the storage space and computation time.Performance analysis in terms of computation overhead and quality of service parameters like loads of parameters with and without attacks,throughput,and stream length for different modes of block cipher mode has been carried out.Security analysis has been carried out by utilizing the Hardening Index as an audit parameter using Lynis 2.7.1.Similarly,for halting the aforementioned approaches and for regulating trafc,rewall protection has been generated in the chosen hybrid algorithms.Finally,enhancements in the performance of the Paillier and Blowsh hybrid scheme with and without compression compared to the existing schemes using RSA and AES procedures have been demonstrated. 展开更多
关键词 CRYPTOGRAPHY blowsh homomorphic paillier cloud computing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部