Open Access Open Access  Restricted Access Subscription or Fee Access

Time Complexity Analysis of RSA, OTP and Hash Algorithms in Cloud Data

M.Shanmuga Priya, P. Thiruselvan

Abstract


ABSTRACT

Cloud Computing security refers to protection of data in cloud, its applications and the underlying infrastructure using some set of polices, controls and technologies. It is an important trend in information technology throughout the world. Security of a data has a major issue in cloud computing environment. Now a days the data protection technique uses symmetric and uneven encryption algorithms with the strong authentication techniques. This paper proposes the contrast of the performances for number of present security strategies used to offer safety within the area of computing with the extraordinary parameters. it will likely be used to enhance the safety of data storage in a cloud surroundings.

 

Keywords: Security, Cryptography, RSA, OTP and HASH, Embedded computing.

Cite this Article: M. Shanmuga Priya, P. Thiruselvan. Time Complexity Analysis of Rsa, OTP and Hash Algorithms in Cloud Data. International Journal of Embedded Systems and Emerging Technologies. 2019; 5(2): 29–38p.


Full Text:

PDF

References


“Comparison of cloud service providers based on direct and recommended trust rating,” 2013 IEEE International Conference on Electronics, Computing and Communication Technologies, Bangalore, pp. 1-6.

Supriya, M., Sangeeta, K., & Patra, G. K. (2016). “A fuzzy based hierarchical trust framework to rate the cloud service providers based on infrastructure facilities”. International Journal of Performability Engineering, 12(1), 55-62 pp.

Supriya, M., Sangeeta, K., & Patra, G. K. (2014). “Estimation of trust values for varying levels of trustworthiness based on infrastructure as a service”. Paper presented at the ACM International Conference Proceeding Series, Amritapuri, India, 10-11-October-201410.1145/2660859.2660921.

William Stallings. “Cryptography and Network Security Principles and, Pearson Education”, Inc., publishing as prentice Hall, ISBN-13: 9780133354690.

Santhanalakshmi, S., Sangeeta, K., & Patra, G. K. (2017). “Design of secure cryptographic hash function using soft computing techniques”. International Journal of Advances in Soft Computing and its Applications, 9(2), 188-203 PP.

Jonathan Katz & Yehuda Lindell (2015). “Introduction to Cryptography Modern” 1-512 PP.

Nasrin Khanezaei, Zurina Mohd Hanapi, (2014). “A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services” in 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014), 12 - 14 December 2014, Kuala Lumpur, Malaysia.

Hamza Ali Olwan, Mohammed Khalifa Musa, (2017). “Hybrid Model Based on RSA Algorithm Combines with One Time Pad Algorithm to Improve Security and performance” in Imperial Journal of Interdisciplinary Research (IJIR) Vol-3, Issue-5, 1924-1927 PP,2017 ISSN: 2454-1362

Yun Huang, Zheng Huang, Haoran Zhao, Xuejia Lai, (2013). “A new One-time Password Method” in Volume 4, 2013, Pages 32-37 2013 International Conference on Electronic Engineering and Computer Science.

https://www.drivehq.com/, Date of access: 1/7/2019.




DOI: https://doi.org/10.37628/jeset.v5i2.1176

Refbacks

  • There are currently no refbacks.