Key-Enforced Access Control and Performance Analysis of DES and RSA Cryptography in Cloud Computing

2019 International Journal of Engineering and Advanced Technology  
Cloud computing has been one of the most popular technologies in Information and Communication Technology the last few years. One of the main obstacles for its adoption is the sensitivity of insecurity and privacy violation. Protecting sensitive and high-value data within a cloud system necessitates the use of cryptographic techniques and cryptographic keys. Management of these keys is especially challenging in cloud environments due to the expanded exposure to various insider and outsider
more » ... t agents. However, it makes it difficult for data owners to resort to the cloud provider for updating the access control policy when the cooperative relationship changes. Key-enforced cloud access control guarantees the cloud users will outsource their data without outsourcing the control, since the user possesses the key rather than the cloud provider. In this manuscript we analyze the encryption and decryption time for DES, 2DES, RSA & Modified RSA (MDRSA) algorithms.
doi:10.35940/ijeat.a9995.109119 fatcat:52ltt6teergajiqarr2wthbhhe