Explore chapters and articles related to this topic
End-to-End Security Framework for Big Sensing Data Streams
Published in Kuan-Ching Li, Hai Jiang, Albert Y. Zomaya, Big Data Management and Processing, 2017
Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen
We compare the performance of our proposed scheme DPBSV with the AES, the standard symmetric-key encryption algorithm [18,19]. Our scheme was compared with two standard symmetric-key algorithms: 128-bit AES and 256-bit AES. This performance comparison experiment is carried out in JCE. This comparison is based on the features of JCE in Java virtual machine version 1.6 64 bit. JCE is the standard extension to the Java platform, which provides a framework implementation for cryptographic methods. We experimented with many-to-one communication. All sensor nodes communicate with the single node (DSM). All sensors have similar properties, whereas the destination node has the properties of DSM (more powerful to initialize the process). The processing time of data verification is measured at the DSM node. Our experimental results are shown in Figure 13.3; the result validates the theoretical analysis presented in Section 13.5.
Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
Published in IETE Journal of Research, 2021
In this research work, the performance of the encryption algorithms, namely DES, 3DES, AES, Blowfish, RSA and RC4 have been analyzed in a cloud environment using Amazon web services, Microsoft Azure and Google Cloud. The methodology includes the following steps: Step 1: An account has been created and signed up at the Amazon web service, Microsoft Azure and Google Cloud.Step 2: Then, for AWS, Amazon S3 had launched, and buckets had created at the region Asia Pacific (Mumbai) ap-south-1. For Microsoft Azure, azure blobs at South-India (Chennai) had launched. For Google Cloud, buckets had created at asia-south1 (Mumbai).Step 3: The cryptography algorithms are applied to image data using Java Cryptography Extension (JCE) to get ciphers.Step 4: Ciphered image are uploaded to cloud storages using java eclipse IDE SDK.Step 5: The Algorithms are subjected to security analysis and performance analysis. The Matlab R2020a was used for security analysis.