1,054
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Enhancing the Time Performance of Encrypting and Decrypting Large Tabular Data

ORCID Icon & ORCID Icon
Pages 1746-1754 | Received 09 Feb 2021, Accepted 06 Oct 2021, Published online: 22 Oct 2021

References

  • Aono, Y., T. Hayashi, L. Wang, and S. Moriai. 2017. Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security 13 (5):1333–45.
  • Erofeev, A., and R. S. Pawar. 2016. Automatic file encryption: Google patents.
  • Gai, K., M. Qiu, H. Zhao, and J. Xiong. 2016. Privacy-aware adaptive data encryption strategy of big data in cloud computing. Paper presented at the 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).
  • Harba, E. S. I. 2017. Secure data encryption through a combination of AES, RSA and HMAC. Engineering, Technology & Applied Science Research 7 (4):1781–85. doi:https://doi.org/10.48084/etasr.1272.
  • Hazra, T. K., R. Ghosh, S. Kumar, S. Dutta, and A. K. Chakraborty. 2015. File encryption using fisher-yates shuffle. Paper presented at the 2015 International Conference and Workshop on Computing and Communication (IEMCON).
  • Jueneman, R. R., D. J. Linsenbardt, J. N. Young, W. R. Carlisle, and B. G. Tregub. 2016. Method for file encryption: Google patents.
  • Liu, X., G. Yang, Y. Mu, and R. H. Deng. 2018. Multi-user verifiable searchable symmetric encryption for cloud storage. IEEE Transactions on Dependable and Secure Computing 17 (6):1322–32. doi:https://doi.org/10.1109/TDSC.2018.2876831.
  • Mahmoud, H., A. Hegazy, and M. H. Khafagy. 2018. An approach for ample data security based on Hadoop distributed file system. Paper presented at the 2018 International Conference on Innovative Trends in Computer Engineering (ITCE).
  • Maitri, P. V., and A. Verma. 2016. Secure file storage in cloud computing using hybrid cryptography algorithm. Paper presented at the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
  • Mazrekaj, A., I. Shabani, and B. Sejdiu. 2016. Pricing schemes in cloud computing: An overview. International Journal of Advanced Computer Science and Applications 7 (2):80–86. doi:https://doi.org/10.14569/IJACSA.2016.070211.
  • Panda, M. 2016. Performance analysis of encryption algorithms for security. Paper presented at the 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
  • Rachmawati, D., A. Sharif, Jaysilen, and M. A. Budiman. 2018. Hybrid cryptosystem using a tiny encryption algorithm and Luc algorithm. Paper presented at the IOP Conference Series: Materials Science and Engineering.
  • Sajay, K. R., S. S. Babu, and Y. Vijayalakshmi. 2019. Enhancing the security of cloud data using a hybrid encryption algorithm. Journal of Ambient Intelligence and Humanized Computing 1–10.
  • Vishwanath, A., R. Peruri, and J. He. 2016. Security in fog computing through encryption. DigitalCommons@ Kennesaw State University.
  • Yang, L., Z. Han, Z. Huang, and J. Ma. 2018. A remotely keyed file encryption scheme under mobile cloud computing. Journal of Network and Computer Applications 106:90–99. doi:https://doi.org/10.1016/j.jnca.2017.12.017.
  • Zou, L., M. Ni, Y. Huang, W. Shi, and X. Li. 2020. Hybrid encryption algorithm based on AES and RSA in file encryption. Paper presented at the International Conference on Frontier Computing.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.