A Study of Different Encryption Techniques to Generate Keys in Cloud Computing Security

  • Conference paper
  • First Online:
Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 277 Accesses

Abstract

Today, the size of the data grows from GB to TB every day, mainly due to a large evolution of real-time facts. The most important data is delivered via storage in the cloud. As cloud system offers online services, several attackers and envious users are involved. Attackers continuously try to access the confidential huge data of users without taking the right of access. They sometimes substitute bogus data for the actual data. Security has therefore recently become a major concern. Encryption also ensures data privacy and integrity over communication channels during transmission. In this review paper, different encryption algorithms are reviewed to assess the significance of the keys used for encryption as a vital component for the asset of the method. In most businesses, the relevance of encryption techniques is acknowledged; consequently, data encryption has become vital, since data security is a fundamental component for data and information safety in various institutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 199.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chang V, Kuo YH, Ramachandran M (2016) Cloud computing adoption framework: a security framework for business clouds. Future Gener Comput Syst 57:24–41

    Article  Google Scholar 

  2. Subramanian N (2018) Jeyaraj recent: a security challenges in cloud computing. Comput Electr Eng 71:28–42

    Article  Google Scholar 

  3. Kumar S, Wollinger T (2006) Fundamentals of symmetric cryptography. In: Lemke K, Paar C, Wolf M (eds) Embedded security in cars. Springer, Berlin, Heidelberg, pp 125–143

    Chapter  Google Scholar 

  4. Namasudra S (2019) An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency Comput Pract Exper 31:e4364. https://doi.org/10.1002/cpe.4364

  5. Namasudra S, Roy P (2016) Secure and efficient data access control in cloud computing environment: a survey. Multi-agent Grid Syst Int J 12 (2):69–90

    Google Scholar 

  6. Shabir MY, Iqbal A, Mahmood Z, Ghafoor AU (2016) Analysis of classical encryption techniques in cloud computing. Tsinghua Sci Technol 21(1):102–113

    Google Scholar 

  7. Soofi SS, Khan MI, Amin F (2014) Encryption techniques for cloud data confidentiality. Int J Grid Distrib Comput 17(4):11–20

    Google Scholar 

  8. Manjusha R, Ramachandran R (2014) Comparative study of attribute based encryption techniques in cloud computing, In: 2014 international conference on embedded systems (ICES), 2014, pp 116–120. https://doi.org/10.1109/EmbeddedSys.2014.6953101

  9. Shynu PG, Singh KJ (2018) Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing. Int J Embedded Syst 10(4):287–300

    Google Scholar 

  10. Kaur R, Singh RP (2014) Enhanced cloud computing security and integrity verification via novel encryption techniques. In: International conference on advances in computing, communications and informatics (ICACCI), IEEE, pp 1227–1233

    Google Scholar 

  11. Kaur M, Singh R (2013) Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int J Comput Appl 70(18):16–21

    Google Scholar 

  12. Hemalatha N, Jenis A, Donald AC, Arockiam L (2014) A comparative analysis of encryption techniques and data security issues in cloud computing. Int J Comput Appl 96(16)

    Google Scholar 

  13. Mehmood MS, Shahid MR, Jamil A, Ashraf R, Mahmood T, Mehmood A (2019) A comprehensive literature review of data encryption techniques in cloud computing and IoT environment. In: 8th international conference on information and communication technologies (ICICT), pp 54–59

    Google Scholar 

  14. Suthar K, Kumar P, Gupta H, Patel H (2012) Analytical comparison of symmetric encryption and encoding techniques for cloud environment. Int J Comput Appl 60(19):16–19

    Google Scholar 

  15. Liu X, Zhang Y, Wang B, Yan J (2013) Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans Parallel Distrib Syst 24(6):1182–1191

    Article  Google Scholar 

  16. Song C, Park Y, Gao J, Nanduri SK, Zegers W (2015) Favored encryption techniques for cloud storage. In: IEEE first international conference on big data computing service and applications 267:274

    Google Scholar 

  17. Goyal R, Khurana M (2017) New design of tiny-block hybridization in AES. Int J Comput Netw Inf Secur 9:46–53

    Google Scholar 

  18. Ghosh S, Karar V (2018) Blowfish hybridized weighted attribute-based encryption for secure and efficient data collaboration in cloud computing. Appl Sci 8(7):1119. https://doi.org/10.3390/app8071119

  19. Jeyabalu M, Krishnamoorthy K (2018) Hybridization of ICBC and genetic algorithm for optimizing encryption process in cloud computing application service. Fundamenta Informaticae 157:79–109

    Article  MathSciNet  Google Scholar 

  20. Shehzad D, Khan Z, Da H, Bozku Z (2016) A novel hybrid encryption scheme to ensure hadoop based cloud data security. Int J Comput Sci Inf Secur (IJCSIS) 14(4)

    Google Scholar 

  21. Sangeetha D, Vaidehi V (2016) A secure cloud based personal health record framework for a multi owner environment. Ann Telecomm 72:95–104

    Article  Google Scholar 

  22. Kumar Mohit, Aggarwal Akshat, Garg Ankit (2014) A review on various digital image encryption techniques and security criteria. Int J Comput Appl 96(13):19–26

    Google Scholar 

  23. Brandao PR (2011) The importance of authentication and encryption in cloud computing framework security. Int J Data Sci Technol 4(1):1–5 (2018). 24 Sharma P, Sharma S, Dhakar RS (2011) Modified elgamal cryptosystem. In: 2nd international conference on computer and communication technology, pp 439–443

    Google Scholar 

  24. Radhadevi P, Kalpana P (2012) Secure Image encryption using AES. Int J Res Eng Technol 1(2):115–117

    Article  Google Scholar 

  25. Saha R, Geetha G, Kumar G, Kim T (2018) RK-AES: an improved version of AES using a new key generation process with random keys. Hindawi Secur Commun Netw. Article ID 9802475,11

    Google Scholar 

  26. Hussain Sm, Al-Bahadili H (2016) A DNA-based cryptographic key generation algorithm. In: International conference on security and management, SAM’16, pp. 338

    Google Scholar 

  27. Lozhnikov P, Buraya E, Sulavko S, Eremenko A (2016) Methods of generating key sequences based on keystroke dynamics, dynamics of systems, mechanisms and machines (dynamics). In: Date of conference, pp 15–17

    Google Scholar 

  28. Gayathri P, Umar S, Sridevi G, Bashwanth N, Srikanth R (2017) Hybrid cryptography for random-key generation based on ECC algorithm. Int J Electr Comput Eng (IJECE) 7(3):1293–1298

    Google Scholar 

  29. Wang H (2018) Wang H, Song Y (2018) Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J Med Syst 42:152. https://doi.org/10.1007/s10916-018-0994-6

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Ahadha Parveen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Akilashri, P.S.S., Ahadha Parveen, A. (2022). A Study of Different Encryption Techniques to Generate Keys in Cloud Computing Security. In: Mandal, L., Tavares, J.M.R.S., Balas, V.E. (eds) Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1657-1_34

Download citation

Publish with us

Policies and ethics

Navigation