z-logo
open-access-imgOpen Access
Optimize Cryptography Algorithm for Efficient Data Security on Cloud Computing
Author(s) -
et. al. Dr.M.Buvana
Publication year - 2021
Publication title -
türk bilgisayar ve matematik eğitimi dergisi
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.218
H-Index - 3
ISSN - 1309-4653
DOI - 10.17762/turcomat.v12i1s.1905
Subject(s) - cloud computing , computer science , computer security , confidentiality , cryptography , encryption , server , cloud storage , algorithm , scheme (mathematics) , cloud computing security , distributed computing , computer network , mathematics , operating system , mathematical analysis
Services in the cloud environment are distributed between all servers and users. Cloud providers have problems with file protection as security is a major problem when processing and transferring information, as the original data type can be viewed, misused and lost. In the cloud computing world, cloud protection is a major concern. A variety of research projects are planned to safeguard the cloud climate. Cryptography is used to address the security problem and to achieve the CIA (confidentiality, honesty and disponibility). The most effective technique for ensuring high data transfer and storage protection is cryptography. There are certain drawbacks in traditional symmetric and asymmetrics. We will introduce a new technique of hybrid data protection and confidentiality to solve this issue. We use the ECC and Blowfish to build a hybrid algorithm in this article. The hybrid scheme output is compared to the current hybrid technique and demonstrates the high safety and confidentiality of the patient data in the proposed method. The hybrid encryption is used to remove both symmetrical and asymmetrical drawbacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here