Review Article: Cryptographic Algorithms for Enhancing Security in Cloud Computing.

Document Type : Review Article

Authors

1 Mathematics and computer science, faculty of science

2 Faculty of Computers and AI, Benha University, Benha, Egypt

3 Port said University, Faculty of Science, Department of Mathematics, Egypt.

4 Faculty of Computers and Artificial Intelligence, Damietta University

Abstract

Cloud computing allows a huge amount of data storage and processing power to be available to users over the Internet. Many organizations are migrating from traditional data storage to cloud storage, which provides an efficient method to access data from anywhere and at any time. However, organizations' biggest barrier to adopting cloud computing is data security. Data security is one of the most critical aspects of cloud computing. As a result, there are various data security methods and implementations. Data encryption is the most commonly used method for protecting data security, which means that encrypting data before uploading it to the Cloud prevents unauthorized people from accessing it. This article provides an overview of existing symmetric and asymmetric cryptography algorithms. We cover Advanced Encryption Standard Algorithm (AES), Data Encryption Standard (DES), Triple Data Encryption (TDES), Twofish, and Blowfish for symmetric encryption techniques. Rivest - Shamir Adleman (RSA), Diffie-Hellman Key Exchange (DHKE), and El-Gamal are handled as asymmetric encryption algorithms.

Keywords

Main Subjects