Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Due to the recent explosion in the amount of data being created by various social media platforms, e-commerce websites, and other businesses, a paradigm shift from on-site data centers to the cloud is required. Concerns about privacy and secrecy have been a major obstacle to the mainstream adoption of cloud computing. The best approach to protect the confidentiality and privacy of cloud data is by using cryptographic techniques. Researchers have developed several cryptographic algorithms, but they all have lengthy, linear, predictable, memory-intensive execution times. The performance of the CPU, memory, run-time trend, and throughput of the three cryptographic schemes: Enhanced RSA (ERSA), Non-Deterministic Cryptographic Scheme (NCS), and Enhanced Homomorphic Scheme (EHS) are compared using RAsys. The experiment’s results demonstrated that NCS and EHS produced non-linear and non-deterministic run times. Again, NCS and EHS produced the lowest throughput and memory consumption for text and numeric data types when data sizes of 5n∗102 (KB (∈ 1, 2, 4, 10, 20, 40) were processed. However, ERSA produced a run-time trend that was deterministic, linear, and predictable

References Powered by Scopus

EHealth Cloud Security Challenges: A Survey

146Citations
N/AReaders
Get full text

A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)

143Citations
N/AReaders
Get full text

CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

108Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Adaptive Incremental Modeling Combined with Hidden Markov Modeling in Cyber Security

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Dawson, J. K., Twum, F., Acquah, J. B. H., & Missah, Y. M. (2024). Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS. Journal of Cyber Security and Mobility, 13(2), 265–282. https://doi.org/10.13052/jcsm2245-1439.1324

Readers' Seniority

Tooltip

Researcher 1

100%

Readers' Discipline

Tooltip

Engineering 1

100%

Article Metrics

Tooltip
Social Media
Shares, Likes & Comments: 149

Save time finding and organizing research with Mendeley

Sign up for free