Indian Journal of Public Health Research & Development

  • Year: 2019
  • Volume: 10
  • Issue: 5

A Comparative Performance Evaluation Approach to Assess Data Security using Cryptographic Algorithms

1CSE, Canara Engineering College, Mangalore, India

2Dept. of MCA, DSCM& IT, Bangalore, India

Abstract

Data security is of utmost importance these days due to widespread usage of cloud environment for storage of data. As the data is stored in chunks in multiple location servers, it is quite difficult to manage the access control and privacy. Being significant to any stream, data security has gained immense popularity in research. Cryptography plays a vital role in preserving data confidentiality from unauthorized access and intruders. Though this area is researched a lot but new cryptographic schemes are introduced frequently to upgrade the level of security. In this paper we review some of the most popular cryptographic mechanisms used in data storage environment, especially in cloud to protect privacy and integrity of data. We finally compare efficiency of algorithms with respect to operational time consumption. Simulation results demonstrates the comparative performance of symmetric, asymmetric algorithms and hashing mechanisms among the peers.

Keywords

Data Security, Cloud Computing, Cryptography, Access Control, ABE