Sunyani Technical University, Sunyani, Ghana.
Kwame Nkrumah University of Science and Technology, Kumasi, Ghana.
PLoS One. 2023 Sep 7;18(9):e0290831. doi: 10.1371/journal.pone.0290831. eCollection 2023.
The cloud is becoming a hub for sensitive data as technology develops, making it increasingly vulnerable, especially as more people get access. Data should be protected and secured since a larger number of individuals utilize the cloud for a variety of purposes. Confidentiality and privacy of data is attained through the use of cryptographic techniques. While each cryptographic method completes the same objective, they all employ different amounts of CPU, memory, throughput, encryption, and decryption times. It is necessary to contrast the various possibilities in order to choose the optimal cryptographic algorithm. An integrated data size of 5n*102 (KB (∈ 1,2,4,10,20,40) is evaluated in this article. Performance metrics including run time, memory use, and throughput time were used in the comparison. To determine the effectiveness of each cryptographic technique, the data sizes were run fifteen (15) times, and the mean simulation results were then reported. In terms of run time trend, NCS is superior to the other algorithms according to Friedman's test and Bonferroni's Post Hoc test.
随着技术的发展,云正成为敏感数据的中心,使其变得越来越脆弱,尤其是随着越来越多的人能够访问云。由于许多人出于各种目的使用云,因此应该保护和确保数据的安全。通过使用加密技术来实现数据的机密性和隐私性。虽然每种加密方法都完成相同的目标,但它们都使用不同数量的 CPU、内存、吞吐量、加密和解密时间。为了选择最佳的加密算法,有必要对各种可能性进行对比。本文评估了一个集成数据大小为 5n*102(KB(∈1,2,4,10,20,40))。在比较中使用了运行时间、内存使用和吞吐量时间等性能指标。为了确定每种加密技术的有效性,对十五个(15)数据大小进行了运行,然后报告了平均模拟结果。根据 Friedman 检验和 Bonferroni 事后检验,从运行时间趋势来看,NCS 优于其他算法。