Abstract
Today, the size of the data grows from GB to TB every day, mainly due to a large evolution of real-time facts. The most important data is delivered via storage in the cloud. As cloud system offers online services, several attackers and envious users are involved. Attackers continuously try to access the confidential huge data of users without taking the right of access. They sometimes substitute bogus data for the actual data. Security has therefore recently become a major concern. Encryption also ensures data privacy and integrity over communication channels during transmission. In this review paper, different encryption algorithms are reviewed to assess the significance of the keys used for encryption as a vital component for the asset of the method. In most businesses, the relevance of encryption techniques is acknowledged; consequently, data encryption has become vital, since data security is a fundamental component for data and information safety in various institutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chang V, Kuo YH, Ramachandran M (2016) Cloud computing adoption framework: a security framework for business clouds. Future Gener Comput Syst 57:24–41
Subramanian N (2018) Jeyaraj recent: a security challenges in cloud computing. Comput Electr Eng 71:28–42
Kumar S, Wollinger T (2006) Fundamentals of symmetric cryptography. In: Lemke K, Paar C, Wolf M (eds) Embedded security in cars. Springer, Berlin, Heidelberg, pp 125–143
Namasudra S (2019) An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency Comput Pract Exper 31:e4364. https://doi.org/10.1002/cpe.4364
Namasudra S, Roy P (2016) Secure and efficient data access control in cloud computing environment: a survey. Multi-agent Grid Syst Int J 12 (2):69–90
Shabir MY, Iqbal A, Mahmood Z, Ghafoor AU (2016) Analysis of classical encryption techniques in cloud computing. Tsinghua Sci Technol 21(1):102–113
Soofi SS, Khan MI, Amin F (2014) Encryption techniques for cloud data confidentiality. Int J Grid Distrib Comput 17(4):11–20
Manjusha R, Ramachandran R (2014) Comparative study of attribute based encryption techniques in cloud computing, In: 2014 international conference on embedded systems (ICES), 2014, pp 116–120. https://doi.org/10.1109/EmbeddedSys.2014.6953101
Shynu PG, Singh KJ (2018) Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing. Int J Embedded Syst 10(4):287–300
Kaur R, Singh RP (2014) Enhanced cloud computing security and integrity verification via novel encryption techniques. In: International conference on advances in computing, communications and informatics (ICACCI), IEEE, pp 1227–1233
Kaur M, Singh R (2013) Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int J Comput Appl 70(18):16–21
Hemalatha N, Jenis A, Donald AC, Arockiam L (2014) A comparative analysis of encryption techniques and data security issues in cloud computing. Int J Comput Appl 96(16)
Mehmood MS, Shahid MR, Jamil A, Ashraf R, Mahmood T, Mehmood A (2019) A comprehensive literature review of data encryption techniques in cloud computing and IoT environment. In: 8th international conference on information and communication technologies (ICICT), pp 54–59
Suthar K, Kumar P, Gupta H, Patel H (2012) Analytical comparison of symmetric encryption and encoding techniques for cloud environment. Int J Comput Appl 60(19):16–19
Liu X, Zhang Y, Wang B, Yan J (2013) Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans Parallel Distrib Syst 24(6):1182–1191
Song C, Park Y, Gao J, Nanduri SK, Zegers W (2015) Favored encryption techniques for cloud storage. In: IEEE first international conference on big data computing service and applications 267:274
Goyal R, Khurana M (2017) New design of tiny-block hybridization in AES. Int J Comput Netw Inf Secur 9:46–53
Ghosh S, Karar V (2018) Blowfish hybridized weighted attribute-based encryption for secure and efficient data collaboration in cloud computing. Appl Sci 8(7):1119. https://doi.org/10.3390/app8071119
Jeyabalu M, Krishnamoorthy K (2018) Hybridization of ICBC and genetic algorithm for optimizing encryption process in cloud computing application service. Fundamenta Informaticae 157:79–109
Shehzad D, Khan Z, Da H, Bozku Z (2016) A novel hybrid encryption scheme to ensure hadoop based cloud data security. Int J Comput Sci Inf Secur (IJCSIS) 14(4)
Sangeetha D, Vaidehi V (2016) A secure cloud based personal health record framework for a multi owner environment. Ann Telecomm 72:95–104
Kumar Mohit, Aggarwal Akshat, Garg Ankit (2014) A review on various digital image encryption techniques and security criteria. Int J Comput Appl 96(13):19–26
Brandao PR (2011) The importance of authentication and encryption in cloud computing framework security. Int J Data Sci Technol 4(1):1–5 (2018). 24 Sharma P, Sharma S, Dhakar RS (2011) Modified elgamal cryptosystem. In: 2nd international conference on computer and communication technology, pp 439–443
Radhadevi P, Kalpana P (2012) Secure Image encryption using AES. Int J Res Eng Technol 1(2):115–117
Saha R, Geetha G, Kumar G, Kim T (2018) RK-AES: an improved version of AES using a new key generation process with random keys. Hindawi Secur Commun Netw. Article ID 9802475,11
Hussain Sm, Al-Bahadili H (2016) A DNA-based cryptographic key generation algorithm. In: International conference on security and management, SAM’16, pp. 338
Lozhnikov P, Buraya E, Sulavko S, Eremenko A (2016) Methods of generating key sequences based on keystroke dynamics, dynamics of systems, mechanisms and machines (dynamics). In: Date of conference, pp 15–17
Gayathri P, Umar S, Sridevi G, Bashwanth N, Srikanth R (2017) Hybrid cryptography for random-key generation based on ECC algorithm. Int J Electr Comput Eng (IJECE) 7(3):1293–1298
Wang H (2018) Wang H, Song Y (2018) Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J Med Syst 42:152. https://doi.org/10.1007/s10916-018-0994-6
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Akilashri, P.S.S., Ahadha Parveen, A. (2022). A Study of Different Encryption Techniques to Generate Keys in Cloud Computing Security. In: Mandal, L., Tavares, J.M.R.S., Balas, V.E. (eds) Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1657-1_34
Download citation
DOI: https://doi.org/10.1007/978-981-19-1657-1_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1656-4
Online ISBN: 978-981-19-1657-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)