Full Paper View Go Back
Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud
A. Sharma1 , RS Thakur2 , S. Jaloree3
Section:Research Paper, Product Type: Isroset-Journal
Vol.4 ,
Issue.6 , pp.8-14, Dec-2016
Online published on Dec 06, 2016
Copyright © A. Sharma, RS Thakur, S. Jaloree . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud,” International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.8-14, 2016.
MLA Style Citation: A. Sharma, RS Thakur, S. Jaloree "Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud." International Journal of Scientific Research in Computer Science and Engineering 4.6 (2016): 8-14.
APA Style Citation: A. Sharma, RS Thakur, S. Jaloree, (2016). Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud. International Journal of Scientific Research in Computer Science and Engineering, 4(6), 8-14.
BibTex Style Citation:
@article{Sharma_2016,
author = {A. Sharma, RS Thakur, S. Jaloree},
title = {Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2016},
volume = {4},
Issue = {6},
month = {12},
year = {2016},
issn = {2347-2693},
pages = {8-14},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=302},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=302
TI - Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - A. Sharma, RS Thakur, S. Jaloree
PY - 2016
DA - 2016/12/06
PB - IJCSE, Indore, INDIA
SP - 8-14
IS - 6
VL - 4
SN - 2347-2693
ER -
Abstract :
Cloud computing has brought good impact on the way, we use ICT resources. We are using various offerings of cloud computing which includes Flexible Computing Power,Flexible Storage capabilities, Platform as a service,Infrastructure as a service and software as a service on pay per use model. Nows a day the Customers are using their Smartphones to migrate their data in cloud storages but keeping in view of security issues in cloud storages, one must think of encrypting their data in cloud storages. Since in cloud storages, we keep various documents and we must think of fast encryption and decryption symmetric algorithm. but in literature, we do not find work that deals with investigation of efficient cryptic Algorithm for audio or video Files in cloud storages. In this paper, we are analyzing the performance of Cryptographic algorithms AES, Blowfish and DES algorithms in terms of encryption and decryption time taken depending upon the four factors namely file type, file size, key type and key size in case video files which may includes MPG, MPEG formats. For performance analysis, we have used Crypter tools deployed in Amazon Cloud and Tool is capable to encrypt and decrypt different types of files (in terms of size and format) depending upon variable or fixed type of key using AES, Blowfish and DES algorithms and the performance of these Cryptographic algorithms AES, Blowfish and DES algorithms can be analyzed in terms of time taken depending upon different types of files and different types of Keys. Analysis of the result obtained will help the user’s to take decision regarding the selection of best symmetric algorithm to be used while uploading video data in cloud.
Key-Words / Index Term :
Cloud Computing, Cryptography, Encryption, Crypter Tool, Decryption
References :
[1] Vivek Raich, Pradeep Sharma, Shivlal Mewada, Makhan Kumbhkar, "Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
[2] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.
[3] Shivlal Mewada, UK Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, International Journal of Computer Networks and Wireless Communications, Vol.1, No.1, pp.13-19, 2011.
[4] Aarti Shrivastava, Pradeep Sharma, Shivlal Mewada, “Two Level Security Algorithm of Data in Cloud Computing”, UDGAM VIGYATI, Vol 2, pp.188-195, 2015.
[5] Ashok Sharma, Ramjeevan Thakur, Shailesh Jaloree, “Investigation of Efficient cryptic Algorithm for cloud storage”, Fourth International Conference on Recent Trends in Communication and Computer Networks, India, pp.23-30, 2016.
[6] CH. Meyer, SM. Matyas, “Cryptography: A New Dimension in Computer Data Security”, John Wiley & Sons, NewYork, pp.1-640, 1982.
[7] Dorthy Elizabeth, Robling Denning, “Cryptography and Data Security”, Addison-Wesley Publishing Company, Massachusetts, pp.301-340, 1982.
[1] D.W. Davies, W.L. Price, “Security for Computer networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer”, Second Edition John Wiley & Sons, New York, pp.1-450, 1989.
[9] Shivlal Mewada, Sharma Pradeep, SS. Gautam, “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security, Vol. 14, No. 2, pp.105-110, 2016 .
[10] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, IEEE 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp.1-5, 2016.
[11] Shivlal Mewada, Sharma Pradeep, SS. Gautam, “Exploration of Efficient Symmetric Algorithms”, IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), Delhi, 663-666, 2016.
[12] Shaligram Prajapat, Gaurav Parmar, R.S.Thakur, "Towards investigation of efficient Cryptosystem using Sgcrypter", Special Issue of International Journal of Applied Engineering and Research (IJAER), Vol. 10, Issue.79, pp. 853-858, 2015.
[13] S. Prajapat, D. Rajput, Ramjeevan Singh Thakur, "Time variant approach towards symmetric key", proceedings of IEEE Science and Information Conference (SAI), London, pp.398-405, 2013.
[14] Prajapat, Shaligram, Ramjeevan Singh Thakur, "Optimal Key Size of the AVK for Symmetric Key Encryption", in Covenant Journal of Information & Communication Technology, Vol.3, Issue.2, pp. 71-81. 2015.
[15] Prajapat, Shaligram, Ramjeevan Singh Thakur, "Various Approaches towards Crypt-analysis", International Journal of Computer Applications, Vol. 127, Issue.14, pp. 15-24, 2015.
[16] S. Prajapat, RS. Thakur, “Cryptic Mining for Automatic Variable Key Based Cryptosystem”, Elsevier Procedia Computer Science, Vol. 78, Issue.78C, pp. 199-209, 2016.
[17] S. Prajapat, RS. Thakur, "Realization of information exchange with Fibo-Q based Symmetric Cryptosystem", International Journal of Computer Science and Information Security, Vol 14(2), pp. 216-223, 2016.
[18] S. Prajapat, A. Jain, RS. Thakur, “A Novel Approach For Information Security with Automatic Variable Key Using Fibonacci Q-Matrix”, IJCCT, Vol.3. Issue.3, pp.54-57, 2012.
[19] A.N.A. El-Sheikh, A.A. Rashed, “New Approach in Key Generation and Expansion in Rijndael Algorithm”, International Arab Journal of Information Technology, Vol..3, no. 1, pp. 35-41, 2006.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.