Cloud Storage Using Symmetric Alogrithm
Keywords:
Privacy Preserving Storage, Symmetric, AsymmetricAbstract
Now a day’s users have huge amount of data that they cannot store on personal device because of limited storage hence they are move to the public clouds. As you know that cloud server is not a trusted server, so data users wants their data to be safe at cloud side. To preserve the privacy and confidentiality of documents, it should get encrypted before outsourcing to the cloud. For ensuring privacy of documents, numerous algorithms have been developed which makes user data private and avoid unauthorized access to their confidential data. Most essential characteristics of any Encryption algorithm are: Speed of Encryption and Security
References
- Schneier, J. Kelsey, D. Whiting, D. Wagner,C. Hall, and N. Ferguson, “TwoFish: A 128-bit Block Cipher", AES submission, june 1998.
- Nikhil Joshi, Jayachandran Sundarajan et.al. “Tamper Proofing by Design using generalized involution-based concurrent error detection for involutional Substitution Permutation and Feistel Network” IEEE Transaction on Computer, October 2006
- Dr. S.A.M Rizvi, Dr. Syed Zeeshan Hussain et.al “Performance Analysis of AES and TwoFish Encryption Schemes”, International Conference on Communication Systems and Network Technologies 2011
- Shun-Lung Su, Lih-Chyau Wuu, and Jhih-Wei Jhang, “A New 256-bits Block Cipher –Twofish256”
- Shiho Moriai, Yiqun Lisa Yin. “Cryptanalysis of Twofish (II)”.Technical Report, IEICE, ISEC2000-38, 2000.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.