Performance of Symmetric and Asymmetric Encryption Techniques for Attribute Based Encryption

The objective of this research article is to study performance of the the symmetric and asymmetric encryption based on the attributed encryption. In the current scenario, to protect the data in the distributed data base is the challenging task. Mainly to provide the privacy based on the specific par...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of recent technology and engineering Vol. 8; no. 4; pp. 176 - 182
Main Authors Vashi, Devendrasinh, Bhadka, Dr. H B, Patel, Dr. Kuntal, Garg, Dr. Sanjay
Format Journal Article
LanguageEnglish
Published 30.11.2019
Online AccessGet full text

Cover

Loading…
More Information
Summary:The objective of this research article is to study performance of the the symmetric and asymmetric encryption based on the attributed encryption. In the current scenario, to protect the data in the distributed data base is the challenging task. Mainly to provide the privacy based on the specific parameter like attributed based encryption. In this algorithm dataset is provided to do the encryption for the selected sensitive attribute. Them for each symmetric and asymmetric encryption techniques encryption execution time and memory occupied after encryption is observed for ten different dataset. In the experiment and result analysis, each encryption techniques was discussed based on the comparion of encryption time and memory occupied after encryption. Result shows that RC2 encryption is less costlier as compare to AES, 3DES, Rijndael and RSA encryption. Result also indicates that 3DES and RC2 are almost need same encryption time and less costlier as compare to RSA, AES and Rijndael encryption and RSA encryption is more costlier as compare to AES, 3DES, Rijndael and RC2 encryption.
ISSN:2277-3878
2277-3878
DOI:10.35940/ijrte.C6597.118419