z-logo
open-access-imgOpen Access
Key Enforced Access Control and Performance Analysis of DES and RSA Cryptography in Cloud Computing
Author(s) -
Yogesh Kumar,
R. Mahammad Shafi
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.a9995.109119
Subject(s) - cloud computing , outsourcing , cryptography , computer science , computer security , encryption , key (lock) , access control , insider , key management , cloud computing security , business , operating system , marketing , political science , law
Cloud computing has been one of the most popular technologies in Information and Communication Technology the last few years. One of the main obstacles for its adoption is the sensitivity of insecurity and privacy violation. Protecting sensitive and high-value data within a cloud system necessitates the use of cryptographic techniques and cryptographic keys. Management of these keys is especially challenging in cloud environments due to the expanded exposure to various insider and outsider threat agents. However, it makes it difficult for data owners to resort to the cloud provider for updating the access control policy when the cooperative relationship changes. Key-enforced cloud access control guarantees the cloud users will outsource their data without outsourcing the control, since the user possesses the key rather than the cloud provider. In this manuscript we analyze the encryption and decryption time for DES, 2DES, RSA & Modified RSA (MDRSA) algorithms.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here