[1]
Hussaini, Sheena and D Engineer. Cyber Security in Cloud Using Blowfish Encryption., (2020).
Google Scholar
[2]
S. P. Praveen, S. Sindhura, A. Madhuri and D. A. Karras, A Novel Effective Framework for Medical Images Secure Storage Using Advanced Cipher Text Algorithm in Cloud Computing,, 2021 IEEE International Conference on Imaging Systems and Techniques (IST), 2021, pp.1-4,.
DOI: 10.1109/ist50367.2021.9651475
Google Scholar
[3]
Khan, Shahin & Emdad, M. Rifat. (2019). A Standard Data Security model Using AES Algorithm in Cloud Computing. 7. 49-53. 10.26821/IJSHRE.7.5.2019.7508.
Google Scholar
[4]
A. Kumar, Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing,, 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2021, pp.1529-1535,.
DOI: 10.1109/i-smac52330.2021.9640708
Google Scholar
[5]
T. Nie, C. Song and X. Zhi, Performance Evaluation of DES and Blowfish Algorithms,, 2010 International Conference on Biomedical Engineering and Computer Science, 2010, pp.1-4,.
DOI: 10.1109/icbecs.2010.5462398
Google Scholar
[6]
V. Verma, P. Kumar, R. K. Verma and S. Priya, A Novel Approach for Security in Cloud Data Storage Using AES-DES-RSA Hybrid Cryptography,, 2021 Emerging Trends in Industry 4.0 (ETI 4.0), 2021, pp.1-6,.
DOI: 10.1109/eti4.051663.2021.9619274
Google Scholar
[7]
Singh, Gurpreet & Kinger, Supriya. (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications. 67. 33-38. 10.5120/11507-7224.
DOI: 10.5120/11507-7224
Google Scholar
[8]
A. Chauhan and J. Gupta, A novel technique of cloud security based on hybrid encryption by Blowfish and MD5,, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), 2017, pp.349-355,.
DOI: 10.1109/ispcc.2017.8269702
Google Scholar
[9]
V. K. Soman and V. Natarajan, An enhanced hybrid data security algorithm for cloud,, 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), 2017, pp.416-419,.
DOI: 10.1109/netact.2017.8076807
Google Scholar
[10]
D. P. Timothy and A. K. Santra, A hybrid cryptography algorithm for cloud computing security,, 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 2017, pp.1-5,.
DOI: 10.1109/icmdcs.2017.8211728
Google Scholar
[11]
Desai, Chitra & Pund, Shilpa(2012). Implementation of RSA algorithm using Mersenne prime.1.
Google Scholar
[12]
Birendra Goswami, Dr.S.N. Singh. Enhancing Security in Cloud computing using Public Key Cryptography with Matrices., (2012).
Google Scholar
[13]
S. Kumar, G. Karnani, M. S. Gaur and A. Mishra, Cloud Security using Hybrid Cryptography Algorithms,, 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021, pp.599-604,.
DOI: 10.1109/iciem51511.2021.9445377
Google Scholar
[14]
I. Syafalni et al., Cloud Security Implementation using Homomorphic Encryption,, 2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat), 2020, pp.341-345,.
DOI: 10.1109/comnetsat50391.2020.9328979
Google Scholar
[15]
Sohal, Manreet & Sharma, Sandeep. (2018). BDNA-A DNA Inspired Symmetric Key Cryptographic Technique to Secure Cloud Computing. Journal of King Saud University - Computer and Information Sciences. 34. 10.1016/j.jksuci.2018.09.024.
DOI: 10.1016/j.jksuci.2018.09.024
Google Scholar
[16]
X. Zheng, Y. Zhang and B. Peng, Design and Implementation of a DPA Resistant AES Coprocessor,, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp.1-4,.
DOI: 10.1109/wicom.2008.1087
Google Scholar
[17]
A. Behl, Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation,, 2011 World Congress on Information and Communication Technologies, 2011, pp.217-222,.
DOI: 10.1109/wict.2011.6141247
Google Scholar
[18]
Tallapally, Sampath & Manjula, B.. (2020). Competent multi-level encryption methods for implementing cloud security. IOP Conference Series: Materials Science and Engineering. 981. 022039. 10.1088/1757-899X/981/2/022039.
DOI: 10.1088/1757-899x/981/2/022039
Google Scholar
[19]
M. Thangapandiyan, P. M. R. Anand and K. S. Sankaran, Enhanced Cloud Security Implementation Using Modified ECC Algorithm,, 2018 International Conference on Communication and Signal Processing (ICCSP), 2018, pp.1019-1022,.
DOI: 10.1109/iccsp.2018.8524212
Google Scholar
[20]
S. Singh and V. Kumar, Secured user's authentication and private data storage- access scheme in cloud computing using Elliptic curve cryptography,, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 2015, pp.791-795.
Google Scholar
[21]
V. S. Mahalle and A. K. Shahade, Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm,, 2014 International Conference on Power, Automation and Communication (INPAC), 2014, pp.146-149,.
DOI: 10.1109/inpac.2014.6981152
Google Scholar
[22]
D. Garg, K. K. Bhatia and S. Gupta, A novel Genetic Algorithm based Encryption Technique for Securing Data on Fog Network Using DNA Cryptography,, 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), 2022, pp.362-368,.
DOI: 10.1109/iciptm54933.2022.9754031
Google Scholar
[23]
M. S. Rao, K. Venkata Rao and M. H. M. Krishna Prasad, Hybrid Security Approach for Database Security using Diffusion based cryptography and Diffie-Hellman key exchange Algorithm,, 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2021, pp.1608-1612,.
DOI: 10.1109/i-smac52330.2021.9640762
Google Scholar
[24]
Sonia KOTEL and Fatma SBIAA, A Data Security Algorithm for the Cloud Computing based on Elliptic Curve Functions and Sha3 Signature, International Journal of Advanced Computer Science and Applications(IJACSA), 13(3), (2022).
DOI: 10.14569/ijacsa.2022.0130355
Google Scholar