CFP last date
20 January 2025
Reseach Article

Performance comparison of 3DES, AES, Blowfish and RSA for Dataset Classification and Encryption in Cloud Data Storage

by Daniel Commey, Selorm Griffith Klogo, James Dzisi Gadze
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 40
Year of Publication: 2020
Authors: Daniel Commey, Selorm Griffith Klogo, James Dzisi Gadze
10.5120/ijca2020919897

Daniel Commey, Selorm Griffith Klogo, James Dzisi Gadze . Performance comparison of 3DES, AES, Blowfish and RSA for Dataset Classification and Encryption in Cloud Data Storage. International Journal of Computer Applications. 177, 40 ( Feb 2020), 17-22. DOI=10.5120/ijca2020919897

@article{ 10.5120/ijca2020919897,
author = { Daniel Commey, Selorm Griffith Klogo, James Dzisi Gadze },
title = { Performance comparison of 3DES, AES, Blowfish and RSA for Dataset Classification and Encryption in Cloud Data Storage },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2020 },
volume = { 177 },
number = { 40 },
month = { Feb },
year = { 2020 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number40/31169-2020919897/ },
doi = { 10.5120/ijca2020919897 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:48:15.594827+05:30
%A Daniel Commey
%A Selorm Griffith Klogo
%A James Dzisi Gadze
%T Performance comparison of 3DES, AES, Blowfish and RSA for Dataset Classification and Encryption in Cloud Data Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 40
%P 17-22
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud data storage are logical pools containing physical storages on multiple servers in different locations. All over the world, organizations and individuals are leveraging the storage of their confidential data to cloud data storages to reduce cost and enjoy the numerous benefits the cloud has to offer. Nonetheless, there are several security risks associated with outsourcing data to cloud data storages and the most concerning among these risks is the breach of data confidentiality. Data confidentiality is crucial in cloud data storages as the impact risk of a data breach can be catastrophic. Encryption is the best way to ensure data confidentiality and that, data is protected from unauthorized disclosure. The two most important features of encryption algorithms are the guarantee of security without any vulnerabilities (strength of encryption) and the efficiency (performance) of the algorithm. This paper presents a survey of popular encryption algorithms (Triple DES, AES, Blowfish and RSA) and their performance comparison report by simulating the selected encryption algorithms with a classification framework.

References
  1. V. Kumar, S. Chaisiri, R. Ko, and Institution of Engineering and Technology, Data security in cloud computing. 2017.
  2. R. Arora, A. Parashar, and C. C. I. Transforming, “Secure user data in cloud computing using encryption algorithms,” International journal of engineering research and applications, vol. 3, no. 4, pp. 1922–1926, 2013.
  3. J.-P. Aumasson and M. D. Green, Serious cryptography: a practical introduction to modern encryption. San Francisco: No Starch Press, 2017.
  4. J. R. Vacca, Ed., Cloud computing security: foundations and challenges. Boca Raton: CRC Press/Taylor & Francis Group, 2017.
  5. H. Delfs and H. Knebl, Introduction to Cryptography Principles and Applications. Springer, 2015.
  6. J. Buchmann, Introduction to cryptography. Springer Science & Business Media, 2013.
  7. W. Stallings, Cryptography and network security: principles and practice. Pearson Upper Saddle River, 2017.
  8. G. Singh, “A study of encryption algorithms (RSA, DES, 3DES and AES) for information security,” International Journal of Computer Applications, vol. 67, no. 19, 2013, doi: 10/gf3359.
  9. A. Nadeem and M. Y. Javed, “A performance comparison of data encryption algorithms,” in 2005 international conference on information and communication technologies, 2005, pp. 84–89, doi: 10/b8t8p6.
  10. D. E. Standard, “Federal information processing standards publication 46,” National Bureau of Standards, US Department of Commerce, vol. 23, 1977.
  11. J. Nechvatal et al., “Report on the development of the Advanced Encryption Standard (AES),” Journal of Research of the National Institute of Standards and Technology, vol. 106, no. 3, p. 511, 2001, doi: 10/gf4wxq.
  12. T. Jamil, “The rijndael algorithm,” IEEE potentials, vol. 23, no. 2, pp. 36–38, 2004, doi: 10/cx33c3.
  13. A. K. Mandal, C. Parakash, and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES,” in 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science, 2012, pp. 1–5, doi: 10/gf4zf9.
  14. S. O. M. Kamel, M. S. El Sherif, A. S. T. El Dein, and S. A. El Rahman, “Novel TEA Algorithm for IP Telephony System,” International Journal of Informatics and Communication Technology (IJ-ICT), vol. 1, no. 1, pp. 6–19, 2012, doi: 10/gf4zpp.
  15. S. A. M. Rizvi, S. Z. Hussain, and N. Wadhwa, “Performance Analysis of AES and TwoFish Encryption Schemes,” in 2011 International Conference on Communication Systems and Network Technologies, Katra, Jammu, India, 2011, pp. 76–79, doi: 10/fkpd2j.
  16. A. Ramesh and A. Suruliandi, “Performance analysis of encryption algorithms for Information Security,” in 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), Nagercoil, 2013, pp. 840–844, doi: 10/gf9rhq.
  17. S. Kansal and M. Mittal, “Performance evaluation of various symmetric encryption algorithms,” in 2014 International Conference on Parallel, Distributed and Grid Computing, 2014, pp. 105–109, doi: 10/gf4wx8.
  18. J. Raigoza and K. Jituri, “Evaluating Performance of Symmetric Encryption Algorithms,” in 2016 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2016, pp. 1378–1379, doi: 10.1109/CSCI.2016.0258.
  19. M. Panda, “Performance analysis of encryption algorithms for security,” in 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, Odisha, India, 2016, pp. 278–284, doi: 10.1109/SCOPES.2016.7955835.
  20. G. Disterer, “ISO/IEC 27000, 27001 and 27002 for information security management,” 2013, doi: 10/gfvhsf.
  21. F. Pub, “Standards for Security Categorization of Federal Information and Information Systems,” NIST FIPS–199, 2004.
  22. S. Zevin, Standards for security categorization of federal information and information systems. DIANE Publishing, 2009.
  23. S. Radack, “Managing Information Security Risk: Organization, Mission and Information System View,” National Institute of Standards and Technology, 2011.
  24. Eforexcel, “Sample CSV Files / Data Sets for Testing - Human Resources,” E for Excel | Awakening Microsoft Excel Student Inside You. [Online]. Available: http://eforexcel.com/wp/downloads-16-sample-csv-files-data-sets-for-testing/. [Accessed: 27-Jun-2019].
  25. M. Bellare and P. Rogaway, “Optimal asymmetric encryption,” in Workshop on the Theory and Application of of Cryptographic Techniques, 1994, pp. 92–111.
  26. V. Shoup, “OAEP reconsidered,” in Annual International Cryptology Conference, 2001, pp. 239–259, doi: 10/fj9f2f.
  27. J. Jonsson and B. Kaliski, “Public-key cryptography standards (PKCS)# 1: RSA cryptography specifications version 2.1,” 2003, doi: 10/btnp.
  28. D. H. Phan and D. Pointcheval, “OAEP 3-round: A generic and secure asymmetric encryption padding,” in International Conference on the Theory and Application of Cryptology and Information Security, 2004, pp. 63–77.
  29. M. Bellare and P. W. Rogaway, “Block cipher mode of operation for secure, length-preserving encryption,” Sep-1997.
  30. M. Dworkin, “Recommendation for block cipher modes of operation: methods for format-preserving encryption,” NIST Special Publication, vol. 800, p. 38G, 2016.
  31. M. Dworkin, “Recommendation for block cipher modes of operation. methods and techniques,” National Inst of Standards and Technology Gaithersburg MD Computer security Div, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Encryption Algorithms Cloud Data Storage Data Confidentiality