Main Article Content

Comparative Analysis of Some Efficient Data Security Methods among Cryptographic Techniques for Cloud Data Security


M.A.T. Abubakar
A. Aloysius
Z. Umar
M. Dauda

Abstract

The concept of cloud computing model is to grant users access to outsource data from the cloud server without them having to worry about aspects of the hardware and software management. The owner of the data encrypts it before outsourcing to a Cloud Service Provider (CSP) server for effective deployment of sensitive data. Data confidentiality is a demanding task of cloud data protection. Thus, to solve this problem, lots of techniques are needed to defend the shared data. We focus on cryptography to secure the data while transmitting in the network. We deployed Advanced Encryption Standard (AES) used as encryption method for cloud data security, to encrypt the sensitive data which is to be transmitted from sender to receiver in the network and to decrypt so that the receiver can view the original data. Arrays of encryption systems are being deployed in the world of Information Systems by various organizations. In this paper, comparative analysis of some various encryption algorithms in cryptography have been implemented by comparing their performance in terms of stimulated time during Encryption and decryption in the network.


Keywords: AES, Data Control, Data Privacy, Data Storage, Encryption Algorithms, Verification.


Journal Identifiers


eISSN: 2756-4843