Logo PTI Logo rice

Proceedings of the 2021 Sixth International Conference on Research in Intelligent and Computing

Annals of Computer Science and Information Systems, Volume 27

Authentication and Encryption algorithms for data security in Cloud computing: A comprehensive review

,

DOI: http://dx.doi.org/10.15439/2021R7

Citation: Proceedings of the 2021 Sixth International Conference on Research in Intelligent and Computing, Vijender Kumar Solanki, Nguyen Ho Quang (eds). ACSIS, Vol. 27, pages 5763 ()

Full text

Abstract. With the growth of data stored in cloud, data may become the target of attackers in the Internet. Therefore, the end users require high confidentiality, integrity and authentication in order to protect their data in cloud. In this paper, we aim at a comprehensive studying about the data security in cloud computing. The paper will discuss the details of cloud computing data security challenges and find out which are the most important challenges as well as the efficient solutions. The existing authentication and encryption algorithms are compared in terms of users' scenarios, outstanding features and the limitation. We also review the advantages and drawbacks of the algorithms for data security in terms of cloud computing services.

References

  1. R. Buyya, C. Vecchiola, and S. T. Selvi, “Mastering cloud computing: foundations and applications programming”. Elsevier, 2013.
  2. P. R Kumar, P. H. Raj, and P. Jelciana, “Exploring data security issues and solutions in cloud computing” in Procedia Computer Science, vol. 125, pp. 691-697, January 2018.
  3. Yunchuan Sun, Junsheng Zhang, Yongping Xiong and Guangyu Zhu, “Data security and privacy in cloud computing” in International Journal of Distributed Sensor Networks, July 2014.
  4. B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami and M. Ayaz, "A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies" in IEEE Access, vol. 9, pp. 57792-57807, April 2021.
  5. M. K. Sasubilli and V. R, "Cloud computing security challenges, threats and vulnerabilities", 2021 6th International Conference on Inventive Computation Technologies (ICICT), pp. 476-480, 2021.
  6. Isma Zulifqar, Sadia Anayat, Imtiaz Kharal, “A review of data security challenges and their solutions in cloud computing” in I.J. Information Engineering and Electronic Business, March 2021.
  7. M. De Donno, A. Giaretta, N. Dragoni, A. Bucchiarone and M. Mazzara, “Cyber-storms come from clouds: Security of cloud computing in the IoT era”, May 2019.
  8. T. S. Chou, “Security threats on cloud computing vulnerabilities” in International Journal of Computer Science & Information Technology, vol. 5, no. 3, June 2013.
  9. D. Bhattacharyya, R. Ranjan, F. Alisherov and M. Choi, “Biometric authentication: A review” in International Journal of u-and e-Service, Science and Technology, vol. 2, no. 3, pp. 13-28, September 2009.
  10. I. Indu, P. R. Anand, and V. Bhaskar, “Identity and access management in cloud envi-ronment: Mechanisms and challenges” in Engineering science and technology, an interna-tional journal, vol. 21, no. 4, pp. 574-588, May 2018.
  11. J. K. Mohsin, L. Han, M. Hammoudeh, and R. Hegarty, “Two factor vs multi-factor, an authentication battle in mobile cloud computing environments” in Proceedings of the International Conference on Future Networks and Distributed Systems, pp. 1-10, July 2017.
  12. W. Stallings, “Cryptography and network security principles and practice”. 7th ed., Pearson, England, 2017.
  13. R. Bhanot, R. Hans, “A review and comparative analysis of various encryption algorithms” in International Journal of Security and Its Applications, vol. 9, no. 4, pp. 289-306, April 2015.
  14. N. Khanezaei and Z. M. Hanapi, “A framework based on RSA and AES encryption algorithms for cloud computing services” in 2014 IEEE Conference on Systems, Process and Control, pp. 58-62, Kuala Lumpur, Malaysia, December, 2014.
  15. A. Sachdev and M. Bhansali, “Enhancing cloud computing security using AES algorithm” in International Journal of Computer Applications, vol. 67, no. 9, April 2013.
  16. X. Zhou and X. Tang, “Research and implementation of RSA algorithm for encryption and decryption” in IEEE Proceedings of 2011 6th international forum on strategic technology, vol. 2, pp. 1118-1121, August 2011.
  17. S. Nalajala, B. Moukthika, M. Kaivalya, K. Samyuktha and N. L. Pratap, “Data security in cloud computing using three-factor authentication” in International Conference on Communication, Computing and Electronics Systems, pp. 343-354, Springer, Singapore, 2020.
  18. N. Salimath, S. Mallappa, N. Padhy and J. Sheetlani, “Scrambling and descrambling of document image for data security in cloud computing” in Smart Intelligent Computing and Applications, pp. 283-290, Springer, Singapore, 2020.
  19. S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar and A. Shanthini, “Towards DNA based data security in the cloud computing environment” in Computer Communications, vol. 151, pp. 539-547, February 2020.
  20. U. Ogiela, “Cognitive cryptography for data security in cloud computing” in Concurrency and Computation: Practice and Experience, vol. 32, no. 18, September 2020.
  21. P. Liu, “Public-key encryption secure against related randomness attacks for improved end-to-end security of cloud/edge computing” IEEE Access, vol. 8, pp. 16750-16759, January 2020.
  22. I. Priyadarshini, “Cyber security risks in robotics” in Cyber security and threats: concepts, methodologies, tools, and applications, pp. 1235-1250, IGI Global, May 2018.
  23. I. Priyadarshini and C. Cotton, “Internet memes: A novel approach to distinguish hu-mans and bots for authentication” in Proceedings of the future technologies conference, pp. 204-222, Springer, Cham, October 2019.
  24. I. Priyadarshini, H. Wang and C. Cotton, “Some cyberpsychology techniques to distinguish humans and bots for authentication” in Proceedings of the Future Technologies Conference, pp. 306-323, Springer, Cham, October 2019.
  25. M. Chakraborty, B. Jana and T. Mandal, “A Secure Cloud Computing Authentication Using Cryptography,” in Proceedings of International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR), 2018, pp. 1-4, http://dx.doi.org/10.1109/ICETIETR.2018.8529100..
  26. H. Lee, D. Kang, Y. Lee, and D. Won, “Secure three-factor anonymous user authentication scheme for cloud computing environment”. Wireless 2021Communications and Mobile Computing, vol. 2021, July 2021.
  27. M. Azrour, J. Mabrouki and R. Chaganti, “New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT”, Security and Communication Networks, 2021.
  28. B. Alemu, R. Kumar, D. Sinwar, G. Raghuwanshi, “Fingerprint Based Authentication Architecture for Accessing Multiple Cloud Computing Services using Single User Credential in IOT Environments”, In Journal of Physics: Conference Series, Vol. 1714, No. 1, p. 012016.
  29. P. Hajder, M. Hajder, M. Liput, M. Nycz, S. Agarwal, D. N. Barrell, & V. K. Solanki, “Direct communication of edge elements in the Industrial Internet of Things”. In FedCSIS (Communication Paper) ACSIS, Vol. 23, pages 35–42 (2020).
  30. C. Mechalikh, H. Taktak, F. Moussa, “PureEdgeSim: A Simulation Framework for Performance Evaluation of Cloud, Edge and Mist Computing Environments” Computer Science and Information Systems, Vol. 18, No. 1, 43–66. (2021).
  31. B. N. Barreto, A. R. de Sa, & A. D. R. L. Ribeiro, “A Fog Computing Architecture for Security and Quality of Service”. In FedCSIS (Position Papers), ACSIS, Vol. 19, pages 69–73, 2019.
  32. M. Saleem, M. R. , Warsi, S. Islam, A. Anjum, & N. Siddiquii, “Trust Management in the World of Cloud Computing. Past Trends and Some New Directions”, Scalable Computing: Practice and Experience, 22(4), 425-444, 2021.