scispace - formally typeset
Search or ask a question
Author

Bushra Shaheen

Bio: Bushra Shaheen is an academic researcher from Jamia Hamdard. The author has contributed to research in topics: Data security & Encryption. The author has an hindex of 1, co-authored 2 publications receiving 1 citations.

Papers
More filters
Book ChapterDOI
29 Aug 2019
TL;DR: Two mainly concerned algorithms are RSA Algorithm and Modification in RSA Encryption Algorithm (MREA) and one of the modifications in RSA encryption algorithm is named as Homomorphic Enc encryption Algorithm.
Abstract: The primary operation performed by cloud computing is to provide dynamic storage capacity and security to its users. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in the accessibility of data. This whole mechanism involves various security algorithms; still there are some security issues which needs to be solved. In this paper, various security algorithms have been discussed in order to analyze the performance of the algorithms and to find out that which encryption algorithm is better for the data protection in the cloud computing platform. The mainly concerned algorithms in this paper are RSA Algorithm and Modification in RSA Encryption Algorithm (MREA). One of the modifications in RSA encryption algorithm is named as Homomorphic Encryption Algorithm.

2 citations

Book ChapterDOI
30 Jul 2019
TL;DR: The main concern of this paper is to analyze which encryption algorithm will be most efficient and convenient to be used in cloud computing to secure data as well as less time consuming algorithm.
Abstract: The concept of cloud computing provides various scalable resources and dynamic capacity of storage which performs operations on the internet. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in accessibility of data. Data protection is also one of the major concern of cloud computing and in order to provide the security to it’s users, cloud computing uses different cryptographic encryption algorithm. The main concern of this paper is to analyze which encryption algorithm will be most efficient and convenient to be used in cloud computing to secure data as well as less time consuming algorithm. Analysis have been done on different criteria like block size, key length, security and speed, encryption flow chart and decryption flow chart.

Cited by
More filters
Book ChapterDOI
16 Dec 2020
TL;DR: In this paper, a cellular automata (CA) based multilingual encryption algorithm is proposed to provide data security. But the proposed algorithm is not suitable for multi-lingual encryption.
Abstract: Authors propose cellular automata (CA) based multilingual encryption algorithm to provide data security. Different components (keyset and encryption key) are required in proposed single attractor cellular automata (SACA) based algorithm to prepare multilingual encrypted dataset. A particular set of keyset and encryption key should be applied on a particular set of multilingual raw dataset to prepare multilingual key mapped dataset. Different syndicate rules should be applied in proposed algorithm using CA based state transition mapping. Data security should be increased due to usage of different syndicate rules. Efficiency of proposed algorithm should be measured using experimental results. Superiority of CA based proposed multilingual encryption algorithm should be measured using comparative analysis with existing algorithms (Blowfish, Twofish, RSA, Triple Data Encryption Standard, Advanced Encryption Standard).

1 citations