(18.222.163.31)
Users online: 4102     
Ijournet
Email id
 

Indian Journal of Public Health Research & Development
Year : 2019, Volume : 10, Issue : 5
First page : ( 1001) Last page : ( 1013)
Print ISSN : 0976-0245. Online ISSN : 0976-5506.
Article DOI : 10.5958/0976-5506.2019.01207.5

A Comparative Performance Evaluation Approach to Assess Data Security using Cryptographic Algorithms

Shenoy H Nagesh1, Dr. Kumar K. R. Anil2, Rajgopal K T1

1CSE, Canara Engineering College, Mangalore, India

2Dept. of MCA, DSCM& IT, Bangalore, India

Online published on 4 June, 2019.

Abstract

Data security is of utmost importance these days due to widespread usage of cloud environment for storage of data. As the data is stored in chunks in multiple location servers, it is quite difficult to manage the access control and privacy. Being significant to any stream, data security has gained immense popularity in research. Cryptography plays a vital role in preserving data confidentiality from unauthorized access and intruders. Though this area is researched a lot but new cryptographic schemes are introduced frequently to upgrade the level of security. In this paper we review some of the most popular cryptographic mechanisms used in data storage environment, especially in cloud to protect privacy and integrity of data. We finally compare efficiency of algorithms with respect to operational time consumption. Simulation results demonstrates the comparative performance of symmetric, asymmetric algorithms and hashing mechanisms among the peers.

Top

Keywords

Data Security, Cloud Computing, Cryptography, Access Control, ABE.

Top

 
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
745,168,209 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.