A Comparative Performance Evaluation Approach to Assess Data Security using Cryptographic Algorithms Shenoy H Nagesh1, Dr. Kumar K. R. Anil2, Rajgopal K T1 1CSE, Canara Engineering College, Mangalore, India 2Dept. of MCA, DSCM& IT, Bangalore, India Online published on 4 June, 2019. Abstract Data security is of utmost importance these days due to widespread usage of cloud environment for storage of data. As the data is stored in chunks in multiple location servers, it is quite difficult to manage the access control and privacy. Being significant to any stream, data security has gained immense popularity in research. Cryptography plays a vital role in preserving data confidentiality from unauthorized access and intruders. Though this area is researched a lot but new cryptographic schemes are introduced frequently to upgrade the level of security. In this paper we review some of the most popular cryptographic mechanisms used in data storage environment, especially in cloud to protect privacy and integrity of data. We finally compare efficiency of algorithms with respect to operational time consumption. Simulation results demonstrates the comparative performance of symmetric, asymmetric algorithms and hashing mechanisms among the peers. Top Keywords Data Security, Cloud Computing, Cryptography, Access Control, ABE. Top |