[PDF][PDF] Performance analysis of different cryptography algorithms

MA Hossain, MB Hossain, MS Uddin… - International Journal of …, 2016 - academia.edu
Data security has been a major concern in the today's information technology era. Especially
it becomes serious in the cloud environment because the data is located in different places …

[PDF][PDF] Cryptography: Avalanche effect of AES and RSA

R Verma, AK Sharma - International Journal of Scientific and …, 2020 - academia.edu
Security is a major concern in the field of computer science. With the advancement in
technology security of data from theft has become a major obstacle. It is necessary to encrypt …

[PDF][PDF] A comprehensive data security and forensic investigation framework for cloud-iot ecosystem

MJ Islam, M Mahin, A Khatun, S Roy, S Kabir… - GUB J. Sci …, 2019 - researchgate.net
The rapid growth of cloud and IoT has various security associated issues that can withhold
its extensive acceptance. Based on this premise, this paper has presented comprehensive …

Security Evaluation Methods and the used parameters for Some Cryptosystem

SB Sadkhan, SF Jawad - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
The evaluation process is a necessary process that must be performed by the designer to
help in avoiding any weakness which happens during the design stages. There are many …

A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking

SB Sadkhan, FH Abdulraheem - … International Conference on …, 2017 - ieeexplore.ieee.org
The security aspect is considered as the most important challenge in communication and
computer networks. Therefore the “security level evaluation” of cryptosystem, is very …

[PDF][PDF] Enhanced security using hybrid encryption algorithm

MK Neha - International Journal of Innovative Research in …, 2016 - scholar.archive.org
Information Security plays a major role in today's scenario. Cloud computing is a technology
that provides access to information and computing resources from anywhere that a network …

[PDF][PDF] Evolving cryptographic approach for enhancing security of resource constrained mobile device outsourced data in cloud computing

K Kaviya, KK Shanthini, M Sujithra - International Journal of …, 2019 - researchgate.net
Mobile cloud computing in the increasing popularity among users of mobile device enables
to store their data in cloud. Security is the major concern when the sensitive information is …

Data security in cloud computing using a hybrid algorithm approach

KD Abel, S Misra, O Jonathan, A Agrawal… - … Intelligence in Machine …, 2022 - Springer
Cloud computing is a technology that provides users with computing resources and storage.
It removes the need for businesses and institutes to maintain expensive computing facilities …

Security evaluation of cryptosystems used in cloud networks

SB Sadkhan, FH Abdulraheem - 2016 Al-Sadeq International …, 2016 - ieeexplore.ieee.org
Cloud networking is the next generation architecture of IT. Clouds are very complex
architectures. They have a replicated thousands of times, and common functional units and …

Cost-effective solutions in cloud computing security

L Hasimi - … in Information & Knowledge Management for Business …, 2021 - Springer
The popularity and advances in technology, recently have created a great deal of interest in
cloud computing, especially for enterprises. Although the cloud computing platform offers a …