Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

Cloud computing architecture and features.

More »

Fig 1 Expand

Table 1.

A comparison of cryptographic algorithms for cloud data security.

More »

Table 1 Expand

Fig 2.

Work flow diagram for proposed algorithm SK4OA.

More »

Fig 2 Expand

Table 2.

Total encryption and mean and standard deviation (μσ) times for proposed SK4OA.

More »

Table 2 Expand

Table 3.

Total decryption and mean and standard deviation (μσ) times for proposed SK4OA.

More »

Table 3 Expand

Fig 3.

Plaintext of file size 2KB to be encrypted.

More »

Fig 3 Expand

Fig 4.

Encrypted results for 2KB data.

More »

Fig 4 Expand

Fig 5.

Decrypted results for a 2KB data.

More »

Fig 5 Expand

Table 4.

Comparing the mean and standard deviation (μσ) encryption time of the proposed SK4OA algorithm against RC4, Salsa20, Chacha20 utilizing different data sizes.

More »

Table 4 Expand

Table 5.

Comparing the mean and standard deviation (μσ) decryption time for the proposed SK4OA algorithm against RC4, Salsa20, Chacha20 algorithms utilizing different data sizes.

More »

Table 5 Expand

Table 6.

Comparing the mean encryption throughput time of the proposed SK4OA scheme against RC4, Salsa20, Chacha20 algorithms utilizing different data sizes.

More »

Table 6 Expand

Table 7.

Comparing the mean decryption throughput time of the proposed SK4OA scheme against RC4, Salsa20 and Chacha20 algorithms utilizing different data sizes.

More »

Table 7 Expand

Table 8.

Comparing the amount of memory utilized by SK4OA and other state-of-the-art algorithms (RC4, Salsa20, Chacha20) during encryption.

More »

Table 8 Expand

Table 9.

Comparing the amount of memory utilized by SK4OA and other state-of-the-art algorithms (RC4, Salsa20, Chacha20) during decryption.

More »

Table 9 Expand