Abstract
With the increasing demand of Cloud based resources, the customers have been attracted to the various offerings of cloud computing and mainly it has been seen that the Cloud storages have been centre of attraction because of free limited storage for users. Customers are moving their documents into cloud storages because of various options in cloud storages. We are using various mobile based apps to store images in our system but due to limited storage capacity of our system we prefer cloud storages for storing different files specially images. The image files include files of various formats like JPG Image Files, GIF Images, JPEG Files etc. The image documents on Cloud or server repository is increasing rapidly. Therefore, it becomes necessary to ensure confidentiality, integrity and authenticity of document or information over cloud storage and in addition, there must be some mechanism that helps users for fast encryption of their image to be stored in cloud and fast decryption of same image from cloud to their devices. Since the service level, agreements are very strong and there is no fear to keep the data in cloud because of strong SLA implementation policies. Therefore, we must investigate Conventional algorithm’s efficiency over cloud in terms encryption time, decryption time, key sizes. In this paper we will analyse the performance for exchange of Images with various block cipher SKC algorithms specially 3DES, AES and Blowfish to find more efficient symmetric block cipher algorithm in the term of encipherment and decipherment time at different settings like variable file sizes with fixed key sizes, variable file sizes with variable key size, Fixed file sizes with fixed key size and Fixed file sizes with variable key sizes.
Key-Words / Index Term
Cloud Computing, Cryptography, Encryption, Crypter Tool, Decryption, encipherment and decipherment
References
[1] Ashok Sharma, Ramjeevan Thakur, Shailesh Jaloree, “Investigation of Efficient cryptic Algorithm for cloud storage”, Fourth International Conference on Recent Trends in Communication and Computer Networks, India, pp.23-30, 2016.
[2] Dimitrios Zissis, Dimitrios Lekkas, “Addressing cloud computing security issues”, Future Generation Computer Systems, Vol. 28, pp.583–592, 2012.
[3] Vivek Raich, Pradeep Sharma, Shivlal Mewada, Makhan Kumbhkar, "Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
[4] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, IEEE 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp.1-5, 2016.
[5] Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms”, IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), Delhi, pp.663–666, 2016.
[6] Dorthy Elizabeth, Robling Denning, “Cryptography and Data Security”, Addison-Wesley Publishing Company, Massachusetts, pp.301-340, 1982.
[7] D.W. Davies, W.L. Price, “Security for Computer networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer”, Second Edition John Wiley & Sons, New York, pp.1-450, 1989.
[8] Noura Aleisa, “A Comparison of the 3DES and AES Encryption Standards ”, International Journal of Security and Its Applications Vol.9, No.7, pp.241-246, 2015.
[9] Shivlal Mewada, Sharma Pradeep, SS. Gautam, “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security (IJCSIS), Vol.14, No.2, pp.105-110, 2016.
[10] Shaligram Prajapat, Gaurav Parmar, R. S. Thakur, "Towards investigation of efficient Cryptosystem using Sgcrypter", International Journal of Applied Engineering and Research (IJAER), Vol. 10, Issue.79, pp. 853-858, 2015.
[11] Prajapat, Shaligram, D. Rajput, Ramjeevan Singh Thakur, "Time variant approach towards symmetric key", in proceedings of IEEE Science and Information Conference (SAI), London , pp.398-405, 2013.
[12] Prajapat, Shaligram, Ramjeevan Singh Thakur. "Optimal Key Size of the AVK for Symmetric Key Encryption", in Covenant Journal of Information & Communication Technology, Vol.3, Issue.2, pp.71-81. 2015.
[13] Prajapat, Shaligram, Ramjeevan Singh Thakur, "Various Approaches towards Crypt-analysis", International
Journal of Computer Applications, Vol.127, Issue.14, pp.15-24, 2015.
[14] Prajapat, Shaligram, Ramjeevan Singh Thakur, “Cryptic Mining for Automatic Variable Key Based Cryptosystem”, Elsevier Procedia Computer Science, Vol.78, Issue.78C, pp. 199-209, 2016.
[15] A. A. Yassin, A. A. Hussain, K. A. A. Mutlaq, "Cloud authentication based on encryption of digital image using edge detection", AISP, India, pp.15-23, 2015.
[16] S. Prajapat, RS. Thakur, "Realization of information exchange with Fibo-Q based Symmetric Cryptosystem", International Journal of Computer Science and Information Security, Vol.14, Issue.2, pp.216-223, 2016.
[17] Prajapat, Shaligram, Jain A. Ramjeevan Singh Thakur, “A Novel Approach For Information Security with Automatic Variable Key Using Fibonacci Q-Matrix”, IJCCT, Vol-3(3), 2012, p.p. No. 54-57, 2012.