Comparative study on encryption algorithms in cloud environment

Cloud computing is the Internet based development and used in computer technology where end users are provided with on demand shared resources, software and information. Security is being a major issue in the cloud computing, and it arise attention for Cloud Service Providers (CSP) and end users. Cl...

पूर्ण विवरण

ग्रंथसूची विवरण
मुख्य लेखक: Suhaimi, Asiah Mastura
स्वरूप: थीसिस
भाषा:अंग्रेज़ी
प्रकाशित: 2017
विषय:
ऑनलाइन पहुंच:http://eprints.utm.my/85768/1/AsiahMasturaSuhaimiMFC2017.pdf
_version_ 1846218354756419584
author Suhaimi, Asiah Mastura
author_facet Suhaimi, Asiah Mastura
author_sort Suhaimi, Asiah Mastura
description Cloud computing is the Internet based development and used in computer technology where end users are provided with on demand shared resources, software and information. Security is being a major issue in the cloud computing, and it arise attention for Cloud Service Providers (CSP) and end users. Cloud computing security problem raises suspicions and makes many organizations refuse the idea of using the cloud in storing certain data within the cloud computing, especially data with high confidentiality. In addition, cloud users try to avoid being controlled by the CSPs. To avoid the data and data transmission from attackers, appropriate key management is necessary. Besides that, all the data is virtual and cloud is an open service and using a public network such as the Internet for application and services, which has security issues like authentication data loss. Encryption algorithm is a technique that is used to make data on the cloud secured. The aim of the study is to propose the authentication model using Kerberos technique for cloud environment to provides more security. This model can benefit by filtering the unauthorized access and also to reduce the memory usage of cloud provider against authentication checks for each user. It also acts as the third party between cloud server and users to allow authorized access to the cloud services. In this research, the performance of the algorithm is measured based on the computational and communication time. The performance is compared with three algorithms which are RSA, DSA and AES. Result experiment shows that RSA is performing much better than DSA and AES in terms of computational time.
format Thesis
id uthm-85768
institution Universiti Teknologi Malaysia
language English
publishDate 2017
record_format eprints
spelling uthm-857682020-07-30T07:30:52Z http://eprints.utm.my/85768/ Comparative study on encryption algorithms in cloud environment Suhaimi, Asiah Mastura QA75 Electronic computers. Computer science Cloud computing is the Internet based development and used in computer technology where end users are provided with on demand shared resources, software and information. Security is being a major issue in the cloud computing, and it arise attention for Cloud Service Providers (CSP) and end users. Cloud computing security problem raises suspicions and makes many organizations refuse the idea of using the cloud in storing certain data within the cloud computing, especially data with high confidentiality. In addition, cloud users try to avoid being controlled by the CSPs. To avoid the data and data transmission from attackers, appropriate key management is necessary. Besides that, all the data is virtual and cloud is an open service and using a public network such as the Internet for application and services, which has security issues like authentication data loss. Encryption algorithm is a technique that is used to make data on the cloud secured. The aim of the study is to propose the authentication model using Kerberos technique for cloud environment to provides more security. This model can benefit by filtering the unauthorized access and also to reduce the memory usage of cloud provider against authentication checks for each user. It also acts as the third party between cloud server and users to allow authorized access to the cloud services. In this research, the performance of the algorithm is measured based on the computational and communication time. The performance is compared with three algorithms which are RSA, DSA and AES. Result experiment shows that RSA is performing much better than DSA and AES in terms of computational time. 2017 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/85768/1/AsiahMasturaSuhaimiMFC2017.pdf Suhaimi, Asiah Mastura (2017) Comparative study on encryption algorithms in cloud environment. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computing. http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:132656
spellingShingle QA75 Electronic computers. Computer science
Suhaimi, Asiah Mastura
Comparative study on encryption algorithms in cloud environment
title Comparative study on encryption algorithms in cloud environment
title_full Comparative study on encryption algorithms in cloud environment
title_fullStr Comparative study on encryption algorithms in cloud environment
title_full_unstemmed Comparative study on encryption algorithms in cloud environment
title_short Comparative study on encryption algorithms in cloud environment
title_sort comparative study on encryption algorithms in cloud environment
topic QA75 Electronic computers. Computer science
url http://eprints.utm.my/85768/1/AsiahMasturaSuhaimiMFC2017.pdf
url-record http://eprints.utm.my/85768/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:132656
work_keys_str_mv AT suhaimiasiahmastura comparativestudyonencryptionalgorithmsincloudenvironment