Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Cloud computing is considered a distributed computing paradigm in which resources are provided as services. In cloud computing, the applications do not run from a user's personal computer but are run and stored on distributed servers on the Internet. The resources of the cloud infrastructures a...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
Institute of Advanced Engineering and Science
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-26650 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-266502023-05-29T17:36:02Z Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen Shawkat S.A. Tuama B.A. Al-Barazanchi I. 57201306583 57207858561 57659035200 Cloud computing is considered a distributed computing paradigm in which resources are provided as services. In cloud computing, the applications do not run from a user's personal computer but are run and stored on distributed servers on the Internet. The resources of the cloud infrastructures are shared on cloud computing on the Internet in the open environment. This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. All rights reserved. Final 2023-05-29T09:36:02Z 2023-05-29T09:36:02Z 2022 Article 10.11591/ijece.v12i6.pp6496-6505 2-s2.0-85138993122 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138993122&doi=10.11591%2fijece.v12i6.pp6496-6505&partnerID=40&md5=99a743bf003c6f7d887415342145f10e https://irepository.uniten.edu.my/handle/123456789/26650 12 6 6496 6505 All Open Access, Gold, Green Institute of Advanced Engineering and Science Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Cloud computing is considered a distributed computing paradigm in which resources are provided as services. In cloud computing, the applications do not run from a user's personal computer but are run and stored on distributed servers on the Internet. The resources of the cloud infrastructures are shared on cloud computing on the Internet in the open environment. This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. All rights reserved. |
author2 |
57201306583 |
author_facet |
57201306583 Shawkat S.A. Tuama B.A. Al-Barazanchi I. |
format |
Article |
author |
Shawkat S.A. Tuama B.A. Al-Barazanchi I. |
spellingShingle |
Shawkat S.A. Tuama B.A. Al-Barazanchi I. Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen |
author_sort |
Shawkat S.A. |
title |
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen |
title_short |
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen |
title_full |
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen |
title_fullStr |
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen |
title_full_unstemmed |
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen |
title_sort |
proposed system for data security in distributed computing in using triple data encryption standard and rivest shamir adlemen |
publisher |
Institute of Advanced Engineering and Science |
publishDate |
2023 |
_version_ |
1806423462162464768 |
score |
13.214268 |