Abstract
The cloud is a radical platform that conveys dynamic, virtualization asset pools and high convenience. Since distributed computing lays on web, security issues like information security, protection, secrecy, and verification are experienced. In order to get rid of these, an assortment of mechanisms and encryption algorithms are utilized in various blends. On the comparable terms, we made utilization of hybrid encryption with the utilization of crossbreed cryptographic calculations to upgrade the security of information or data file on cloud. We plan at scrutinizing different incorporation of encryption algorithms, in view of various execution constraints to reason a hybrid calculation which can anchor information more effectively on cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos Athanasios V., Li, K., Zomaya Albert, Y.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 11(2), 395–404 (2017)
Xiao, Z., Yang, X.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)
Meng, S., Wang, Y., Jiao, L., Miao, Z., Sun, K.: Hierarchical evolutionary game based dynamic cloudlet selection and bandwidth allocation for mobile cloud computing environment. IET Commun. 13(1), 16–25 (2018)
Esposito, C., Castiglione, A., Pop, F., Choo, K.-K. R.: Challenges of connecting edge and cloud computing: a security and forensic perspective. IEEE Cloud Comput. 4(2), 13–17 (2017)
Park, J.-E., Park, Y.-H.: Fog-based file sharing for secure and efficient file management in personal area network with heterogeneous wearable devices. J. Commun. Netw. 20(3), 279–290 (2018)
Zhang, H., Zhou, Z., Ye, L., Du, X.: Towards privacy preserving publishing of set-valued data on hybrid cloud. IEEE Trans. Cloud Comput. 6(2), 316–329 (2018)
Thakur, J., Kumar, N.: DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1(2), 6–12 (2011)
Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26(5), 1206–1216 (2015)
Seo, S.-H., Nabeel, M., Ding, X., Betrino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)
Chen, D., Li, X., Wang, L., Khan, S.U., Wang, J., Zeng, K., Cai, C.: Fast and scalable multi-way analysis of massive neural data. IEEE Trans. Comput. 64(3), 707–719 (2015)
Shiu, Y-S., Chang, S.Y., Wu, H.-C., Huang, S.C.-H., Chen, H.-H.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2), 66–74 (2011)
Wei, , Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
Singh, S.P., Manini, R.: Comparison of data encryption algorithms. Int. J. Comput. Sci. Commun. 2(1), 125–127 (2011)
Singhal, N., Raina, J.P.S.: Comparative analysis of AES and RC4 algorithms for better utilization. Int. J. Comput. Trends Technol. 2(6), 177–181 (2011)
Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R.: Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Commun. Surv. Tutor. 16(1), 369–392 (2014)
Rong, C., Nguyen Son, T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)
Hammoud, A., Otrok, H., Mourad, A., Wahab, O.A., Bentahar, J.: On the detection of passive malicious providers in cloud federations. IEEE Commun. Lett. 23(1), 64–67 (2019)
Arora, A., Khanna, A., Rastogi, A., Agarwal, A.: Cloud security ecosystem for data security and privacy. In: 7th IEEE International Conference on Cloud Computing, Data Science & Engineering-Confluence, pp. 288–292 (2017)
Ojha, S., Rajput, V.: AES and MD5 based secure authentication in cloud computing. In: IEEE International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 856–860 (2017)
Lee, B.-H., Dewi, E.K., Wajdi, M.F.: Data security in cloud computing using AES under HEROKU cloud. In: 27th IEEE Conference on Wireless and Optical Communication Conference (WOCC), pp. 1–5 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, S., Singla, K., Rathee, G., Saini, H. (2020). A Hybrid Cryptographic Technique for File Storage Mechanism Over Cloud. In: Luhach, A., Kosa, J., Poonia, R., Gao, XZ., Singh, D. (eds) First International Conference on Sustainable Technologies for Computational Intelligence. Advances in Intelligent Systems and Computing, vol 1045. Springer, Singapore. https://doi.org/10.1007/978-981-15-0029-9_19
Download citation
DOI: https://doi.org/10.1007/978-981-15-0029-9_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0028-2
Online ISBN: 978-981-15-0029-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)