Key-Enforced Access Control and Performance Analysis of DES and RSA Cryptography in Cloud Computing
Y. Kiran Kumar1, R. Mahammad Shafi2

1Y. Kiran Kumar, Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu, India.
2Dr. R. Mahammad Shafi, Research Supervisor, Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu, India.
Manuscript received on September 23, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP:7220-7225 | Volume-9 Issue-1, October 2019 | Retrieval Number: A9995109119/2019©BEIESP | DOI: 10.35940/ijeat.A9995.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Cloud computing has been one of the most popular technologies in Information and Communication Technology the last few years. One of the main obstacles for its adoption is the sensitivity of insecurity and privacy violation. Protecting sensitive and high-value data within a cloud system necessitates the use of cryptographic techniques and cryptographic keys. Management of these keys is especially challenging in cloud environments due to the expanded exposure to various insider and outsider threat agents. However, it makes it difficult for data owners to resort to the cloud provider for updating the access control policy when the cooperative relationship changes. Key-enforced cloud access control guarantees the cloud users will outsource their data without outsourcing the control, since the user possesses the key rather than the cloud provider. In this manuscript we analyze the encryption and decryption time for DES, 2DES, RSA & Modified RSA (MDRSA) algorithms.
Keywords: Access control, Cloud Security, Encryption Management, Key-Enforced Access Control, Key Management, Multilevel Authentication