Investigation of cryptographic algorithms and attacks in cloud computing
Cloud computing technology is widely used in business environments and for personal use due to optimized use of resources, high flexibility and cost-effectiveness. With the growing cloud computing and the expanding volume of information used in cloud systems, the challenges facing this technology need to be overcome. For many researchers, the main challenge facing the technology is security, which will become more serious with more users embracing the technology. The issue of cloud computing security is a dynamic one, with new methods being introduced every day and existing ones being optimized, simplified, and cost-effective. Since one of the technologies known to protect sensitive information in the process of transferring to cloud computing environment, in this paper, we evaluate and compare the performance of a number of symmetric and asymmetric encryption algorithms in order to investigate security and privacy issues. The purpose of this study was to select the best algorithm in terms of the speed of the cryptographic process and to prevent hacking. The results showed that the asymmetric algorithms are slower than the symmetric ones. Generally speaking, using an encryption algorithm alone can solve the problem of information security. But one algorithm can be merged and used in combination with other methods. The RSA algorithm works very safely during the key generation process. But its execution time is longer than the asymmetric algorithms.
- حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران میشود.
- پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانههای چاپی و دیجیتال را به کاربر نمیدهد.