Loading

Implementation of Different Cyptographic Strategies in Cloud Environment
Anil Gupta1, Durgesh Kumar Mishra2
1Anil Gupta, Department of CSE, Mewar University, Chittorgarh (RJ), India.
2Durgesh Kumar Mishra, Department of CSE, Department, Sri Aurobindo Institute of Technology (SAIT), Indore, MP India. 

Manuscript received on January 05, 2020. | Revised Manuscript received on January 25, 2020. | Manuscript published on January 30, 2020. | PP: 4214-4218 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6516018520/2020©BEIESP | DOI: 10.35940/ijrte.E6516.018520

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is hosted technology used to deliver services over internet. These services are broadly classified based on type of hosting i.e. infrastructure, platform and software. Public environment and internet connectivity make it vulnerable and unsafe for communication and storage. Confidentiality is one of the major principles to keep data privacy and protection at high level. Cryptographic techniques are used to achieve confidentiality and integrity of information during unsafe communication. This research paper observes that various cryptographic algorithms known as symmetric key cryptography and asymmetric key cryptography can be used to protect information and make it unreadable for unauthorised users. This research paper implements different security algorithms and observe their performance based on computation time over different input sizes. The complete research work concludes a comparative study and recommends different security approaches for different situations.
Keywords: Cloud Computing, Cloud Security, Confidentiality, Cryptographic Technique
Scope of the Article: Cloud Computing.