Comparative study on encryption algorithms in cloud environment

Cloud computing is the Internet based development and used in computer technology where end users are provided with on demand shared resources, software and information. Security is being a major issue in the cloud computing, and it arise attention for Cloud Service Providers (CSP) and end users. Cl...

Full description

Saved in:
Bibliographic Details
Main Author: Suhaimi, Asiah Mastura
Format: Thesis
Language:English
Published: 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/85768/1/AsiahMasturaSuhaimiMFC2017.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.85768
record_format uketd_dc
spelling my-utm-ep.857682020-07-30T07:30:52Z Comparative study on encryption algorithms in cloud environment 2017 Suhaimi, Asiah Mastura QA75 Electronic computers. Computer science Cloud computing is the Internet based development and used in computer technology where end users are provided with on demand shared resources, software and information. Security is being a major issue in the cloud computing, and it arise attention for Cloud Service Providers (CSP) and end users. Cloud computing security problem raises suspicions and makes many organizations refuse the idea of using the cloud in storing certain data within the cloud computing, especially data with high confidentiality. In addition, cloud users try to avoid being controlled by the CSPs. To avoid the data and data transmission from attackers, appropriate key management is necessary. Besides that, all the data is virtual and cloud is an open service and using a public network such as the Internet for application and services, which has security issues like authentication data loss. Encryption algorithm is a technique that is used to make data on the cloud secured. The aim of the study is to propose the authentication model using Kerberos technique for cloud environment to provides more security. This model can benefit by filtering the unauthorized access and also to reduce the memory usage of cloud provider against authentication checks for each user. It also acts as the third party between cloud server and users to allow authorized access to the cloud services. In this research, the performance of the algorithm is measured based on the computational and communication time. The performance is compared with three algorithms which are RSA, DSA and AES. Result experiment shows that RSA is performing much better than DSA and AES in terms of computational time. 2017 Thesis http://eprints.utm.my/id/eprint/85768/ http://eprints.utm.my/id/eprint/85768/1/AsiahMasturaSuhaimiMFC2017.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:132656 masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA75 Electronic computers
Computer science
spellingShingle QA75 Electronic computers
Computer science
Suhaimi, Asiah Mastura
Comparative study on encryption algorithms in cloud environment
description Cloud computing is the Internet based development and used in computer technology where end users are provided with on demand shared resources, software and information. Security is being a major issue in the cloud computing, and it arise attention for Cloud Service Providers (CSP) and end users. Cloud computing security problem raises suspicions and makes many organizations refuse the idea of using the cloud in storing certain data within the cloud computing, especially data with high confidentiality. In addition, cloud users try to avoid being controlled by the CSPs. To avoid the data and data transmission from attackers, appropriate key management is necessary. Besides that, all the data is virtual and cloud is an open service and using a public network such as the Internet for application and services, which has security issues like authentication data loss. Encryption algorithm is a technique that is used to make data on the cloud secured. The aim of the study is to propose the authentication model using Kerberos technique for cloud environment to provides more security. This model can benefit by filtering the unauthorized access and also to reduce the memory usage of cloud provider against authentication checks for each user. It also acts as the third party between cloud server and users to allow authorized access to the cloud services. In this research, the performance of the algorithm is measured based on the computational and communication time. The performance is compared with three algorithms which are RSA, DSA and AES. Result experiment shows that RSA is performing much better than DSA and AES in terms of computational time.
format Thesis
qualification_level Master's degree
author Suhaimi, Asiah Mastura
author_facet Suhaimi, Asiah Mastura
author_sort Suhaimi, Asiah Mastura
title Comparative study on encryption algorithms in cloud environment
title_short Comparative study on encryption algorithms in cloud environment
title_full Comparative study on encryption algorithms in cloud environment
title_fullStr Comparative study on encryption algorithms in cloud environment
title_full_unstemmed Comparative study on encryption algorithms in cloud environment
title_sort comparative study on encryption algorithms in cloud environment
granting_institution Universiti Teknologi Malaysia, Faculty of Computing
granting_department Faculty of Computing
publishDate 2017
url http://eprints.utm.my/id/eprint/85768/1/AsiahMasturaSuhaimiMFC2017.pdf
_version_ 1747818451560300544