Optimize Cryptography Algorithm for Efficient Data Security on Cloud Computing
Main Article Content
Abstract
Services in the cloud environment are distributed between all servers and users. Cloud providers have problems with file protection as security is a major problem when processing and transferring information, as the original data type can be viewed, misused and lost. In the cloud computing world, cloud protection is a major concern. A variety of research projects are planned to safeguard the cloud climate. Cryptography is used to address the security problem and to achieve the CIA (confidentiality, honesty and disponibility). The most effective technique for ensuring high data transfer and storage protection is cryptography. There are certain drawbacks in traditional symmetric and asymmetrics. We will introduce a new technique of hybrid data protection and confidentiality to solve this issue. We use the ECC and Blowfish to build a hybrid algorithm in this article. The hybrid scheme output is compared to the current hybrid technique and demonstrates the high safety and confidentiality of the patient data in the proposed method. The hybrid encryption is used to remove both symmetrical and asymmetrical drawbacks.
Downloads
Download data is not yet available.
Metrics
Metrics Loading ...
Article Details
How to Cite
et. al., D. (2021). Optimize Cryptography Algorithm for Efficient Data Security on Cloud Computing. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(1S), 459–464. Retrieved from https://turcomat.org/index.php/turkbilmat/article/view/1905 (Original work published April 11, 2021)
Issue
Section
Articles
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.