2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2017
DOI: 10.1109/icrito.2017.8342485
|View full text |Cite
|
Sign up to set email alerts
|

Cloud security architecture based on user authentication and symmetric key cryptographic techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…In Wani et al (2017), Blowfish is used for securing communication, OTP is used for authentication, SHA3 is used to secure tables and AES is used for file encryption. Experimental analysis on AES, DES, 3DES, Blowfish, RC4, IDEA and TEA, found that AES and Blowfish work best on the different parameters tested.…”
Section: Existing Cloud Encryption Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…In Wani et al (2017), Blowfish is used for securing communication, OTP is used for authentication, SHA3 is used to secure tables and AES is used for file encryption. Experimental analysis on AES, DES, 3DES, Blowfish, RC4, IDEA and TEA, found that AES and Blowfish work best on the different parameters tested.…”
Section: Existing Cloud Encryption Algorithmsmentioning
confidence: 99%
“…While analyzing the algorithms, various drawbacks for each algorithm were identified, such as 3DES does not perform well in terms of running time, power consumption and throughput (Thakur and Kumar, 2011), RSA is slower as compared to symmetric encryption algorithms and is prone to timing attacks (O K Jasim Mohammad et al , 2013), Blowfish suffers from weak keys problem (Thakur and Kumar, 2011) and DES is susceptible to various attacks and can be cracked easily using modern technologies (Aleisa, 2015). Symmetric algorithms are faster than asymmetric algorithms (Yassein et al , 2017), AES algorithm proved to be the most efficient encryption algorithm and most widely used based on various parameters (Altigani et al , 2019; Bhardwaj et al , 2016; O K Jasim Mohammad et al , 2013; Singh and Supriya, 2013; Wani et al , 2017) and a combination of algorithms is believed to perform better as compared to standalone algorithms (Singh and Supriya, 2013).…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing provides a flexible and on-demand virtual pool of configurable computing resources with limited management effort or service provider interactions at all times and anywhere.Cloud computing platform faces a lot of challenges and security still remains one of the biggest challenges. There are many security-related attacks that are well mitigated in non-cloud infrastructures and these solutions are now being applied in cloud computing environments [1]. The risks and challenges of adopting a cloud computing environment are very high due to the migration of a lot of companies to the platform.…”
Section: Introductionmentioning
confidence: 99%