计算机科学
密码学
计算机安全
云计算
安全性分析
密码原语
云安全计算
密码协议
操作系统
作者
Ashish Govindrao Deshpande,C. Srinivasan,Ramakrishnan Raman,S. Rajarajan,Rachit Adhvaryu
标识
DOI:10.1109/icaiccit60255.2023.10465863
摘要
Cloud computing has transformed data storage, processing, and access. However, as cloud-based services grow more popular, protecting sensitive data is crucial. Cryptographic algorithms provide strong encryption, safe key exchange, and data integrity, improving cloud security. Cloud computing uses Secure Hash Algorithm (SHA), Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), and the Diffie-Hellman algorithm key exchange. For verifying data integrity Cloud computing uses SHA. SHA protects data during transmission and storage by creating a unique hash value for each block. This prohibits cloud data manipulation, ensuring data integrity. Asymmetric cloud encryption algorithm RSA is commonly used. Public and private keys ensure data transfer and secrecy. Cloud service providers and customers may securely share private data using the RSA algorithm. ECC's computational efficiency and security are making it desirable in cloud computing. Elliptic curves provide fast key creation and safe data transfer in ECC. Secure communication, encryption, and authentication in cloud settings protect data. Symmetric encryption method of AES is used in cloud computing. Cloud computing requires Diffie-Hellman key exchange for safe communication.
科研通智能强力驱动
Strongly Powered by AbleSci AI