Back to Current Issues

Performance Analysis of Various Encryption and Multilevel Encryption Techniques for Cloud Computing Security

Prof. (Ms.) Kimaya Ambekar, Prof. (Dr.) R. Kamatchi ,

1. Asst. Professor, Somaiya Institute of Management Studies & Research ,2.Professor, Amity University

Cloud computing has been seen as a revolutionary transformation from buy-as-you-need to pay-as-you-use of IT resources. Many organizations have adopted this huge paradigm shift but still, the cloud industry is seeing a little hesitation in adopting Cloud technology. Security is the prominent barrier. Encryption algorithms that can be used in the cloud computing for confidentiality purpose. Here in this paper, a complete analysis of various crypto-graphical algorithms has done. If the application demands quicker response time then one should use Blowfish Algorithm. If the application demands lesser memory space then one should opt Blowfish / AES algorithm. If an application requires more security AES and Blowfish are major considerations. If Applications need more security then for 2nd level of encryption RSA if the best algorithm.

Prof. (Ms.) Kimaya Ambekar, Prof. (Dr.) R. Kamatchi (2018). Performance Analysis of Various Encryption and Multilevel Encryption Techniques for Cloud Computing Security. International Journal of Computer Engineering In Research Trends, 5(4), 122-128. Retrieved from

Keywords :

[1] Cloud Computing Trends: 2017 State of the Cloud Survey, Kim Weins, accessed on 09/12/17 at 6:00 pm
[2] Prof. (Ms.) Kimaya Ambekar, Prof. (Dr.) Kamatchi R.Enhanced User Authentication Model in Cloud Computing Security, Springer International Publishing AG 2016, DOI 10.1007/978-3-319-47952-1_26, pg 327-338
[3] Infotechno- Technology is a life,, Accessed on 09/12/17 at 6:00 pm
[4] What is symmetric key encryption?,, Accessed on 09/12/17 at 6:00 pm
[5] Giuseppe, Asymmetric RSA encryption in Java,, Accessed on 09/12/17 at 6:00 pm
[6]Symmetric-key algorithm,
[7] Advantages and Disadvantages of Asymmetric and Symmetric Cryptosystems,, Accessed on 09/12/17 at 7:00 pm
[8] Data Encryption Standard,
[9] Ritu Tripathi, Sanjay Agrawal, Comparative Study of Symmetric and Asymmetric Cryptography Techniques, International Journal of Advance Foundation and Research in Computer (IJAFRC), Volume 1, Issue 6, June 2014, ISSN 2348 - 4853
[10] Data Encryption Standard (DES),
[11] Triple DES,
[12] Advanced Encryption Standard,
[13] Al Jeeva et all, Comparative analysis of performance efficiency and security measures of some encryption algorithms, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248 - 9622, Vol. 2, Issue 3, May-Jun 2012, pp.3033-3037
[14] Advanced Encryption Standard (AES),,Accessed on 11/12/17 at 3:00 pm
[15] Diffie–Hellman key exchange,, Accessed on 12/12/17 at 3:00 pm
[16] RSA (cryptosystem),,Accessed on 12/12/17 at 5:00 pm
[17] RSA Public Key Encryption System,,, Accessed on 15/12/17 at 2.00pm

DOI Link :

Download :

Refbacks : Currently there are no refbacks

Quick Links


Science Central

Score: 13.30

Submit your paper to [email protected]