Using Security of Algorithms in Cloud Computing and Compare Them

Authors: T.Mshvidobadze
Affiliation: Gori State Teaching University, Gori, Georgia


Keywords: AES, Blowfish, Cloud Computing, Data Security, Elliptic Curve Cryptography (ECC), Symmetric and Asymmetric algorithms
ABSTRACT. In this paper discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of various security algorithms. In general, there are many encryption algorithms that can be used to reduce the real time frauds. These encryption algorithms can be classified into two types. Symmetric encryption algorithms are used earlier for the purpose of providing security such as AES and Blowfish algorithms. In order to provide more security the asymmetric algorithms are used such as RSA algorithm and Elliptic Curve Cryptography (ECC) algorithm. When compared to ECC, RSA algorithms is little slow and uses larger key or message in size. So, now the most efficient ECC algorithm came into the picture in order to provide high security over the existing credit frauds. This proves the efficiency and the less memory usage after the implementation of elliptic curve cryptography.


Zhidong Shen, Li Li , Fei Yan, Xiaoping Wu , Cloud Computing System Based on Trusted Computing Platform, International Conference on Intelligent Computation Technology and Automation, Volume 1, May 2010, On page(s): 942-945
Pearson, S., Benameur, A., Privacy, Security and Trust Issues Arises from Cloud Computing, Cloud Computing Technology and Science (CloudCom), IEEE Second International Conference 2010, On page(s): 693-702
Mohammed, E.M, Ambelkadar, H.S, Enhanced Data Security Model on Cloud Computing, 8th International Conference on IEEE publication 2012, On page(s): cc-12-cc-17
Sang Ho. Na, Jun-Young Park, Eui- Nam Huh, Personal Cloud Computing Security Framework, Service Computing Conference (APSSC), Dec 2010 IEEE, On page(s): 671-675
Wang, J.K.; Xinpei Jia, Data Security and Authentication in hybrid cloud computing model, Global High Tech Congress on Electronics (GHTCE), 2012 IEEE, On page(s): 117- 120
Akhil Behl “Emerging Security Challenges in Cloud Computing ”, IEEE World Congress on Information and Communication Technologies, 2011 pp.217-222
Leena Khanna, Prof. Anant Jaiswal “Cloud Computing: Security Issues And Description Of Encryption Based Algorithms To Overcome Them”, International Journal of Advanced Research in Computer Science and Software Engineering 3(3), March - 2013, pp. 279-283. 8. Text Book: “Cryptography and network security, Principles and practices”, by William Stalling, Retrieved on 8 December 2006
Bruce Schneier, "The Blowfish encryption algorithm", Dr. Dobb's Journal of Software Tools, 19(4), p. 38, 40, 98, 99, April 1994
Neal Koblitz, “Elliptic Curve Cryptosystems”, Mathematics of Computation, Vol 48. Number 177, Jan I987. pp 203-209
Victor S. Miller, “Use of Elliptic Curves in Cryptography”, LNCS, Advances in Cryptology — CRYPTO ’85 Proceeding, Sec V, pp 417-426, 1986, Springer Berlin Heidelberg
Xinmiao Zhang ; Parhi, K.K., “Implementation approaches for the Advanced Encryption Standard algorithm”, Circuits and Systems Magazine, IEEE , Vol 2,Issue: 4 , pp 24