Security Evaluation of Cryptosystems used in Cloud Networks

被引:0
作者
Sadkhan, Sattar B. [1 ]
Abdulraheem, Farqad H. [2 ]
机构
[1] Babylon Univ, IT Coll, Babylon, Iraq
[2] Babylon Univ, Coll Sci, Duhok, Iraq
来源
2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA) | 2016年
关键词
networking; encryption; cryptographysystem and evaluation;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cloud networking is the next generation architecture of IT. Clouds are very complex architectures. They have a replicated thousands of times, and common functional units and can be reduced to simple primitives. many issues related to security were created by complexity of cloud networking as well as all aspects of Cloud networking. Data security is one of the most important issues. The Cloud usually has a one security architecture but has many customers with variety requests. There are new risks introduced by clouds, like multi-tenancy, virtualization and data outsourcing in additional to existing security risks related to Cloud service providers (CSPs) and cloud customers (CCs). information security and their conformity with cloud networking security challenges targeted by Several international and industrial standards. Since there is a continuous increase in the field of communication regarding advanced data, there is an increase in need for time and statistical overhead that is associated with the application of cryptographic. Parallelizing the computation of cryptographic algorithms on many-core computing platforms can be a promising approach to reduce the execution time and eventually the energy consumption of such algorithms. In this paper we will analyze and compare a some of cryptosystems security evaluation approaches worked in cloud networking environment and depended on variety parameters to explain these approaches and show how it work in the few last years with the great modifying in cloud and great data growing.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] An Analytical Study for Security Evaluation of Cryptosystems used in Cloud Networking
    Sadkan, Satiar B.
    Abdulraheem, Farqad H.
    2013 FIRST INTERNATIONAL SCIENTIFIC CONFERENCE ON ELECTRICAL, COMMUNICATION, COMPUTER, POWER, AND CONTROL ENGINEERING (ICECCPCE'13), 2013, : 157 - 162
  • [2] Security of healthcare data networks used for epidemiological studies
    Quantin, C
    Allaert, FA
    Bouzelat, H
    Rodrigues, JM
    Trombert-Paviot, B
    Brunet-Lecomte, P
    Grémy, F
    Dusserre, L
    REVUE D EPIDEMIOLOGIE ET DE SANTE PUBLIQUE, 2000, 48 (01): : 89 - 99
  • [3] Evaluation of The faults of Data Security and Privacy in the Cloud Computing
    Waleed, Al-Museelem
    Li Chunlin
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1838 - 1843
  • [4] Attack on optical cryptosystems by skip connection networks
    Wang, Jiaao
    Wang, Dongfei
    OPTICS EXPRESS, 2024, 32 (11): : 19424 - 19437
  • [5] To Increase Security and Privacy, the QAES Encryption Algorithm is used for Storage of Data for Cloud Computing
    Rani, Geetha E.
    Chetana, D. T.
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [6] Study of Cloud Security in Hyper-scalers
    Panjwani, Megha
    De, Suman
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 29 - 34
  • [7] Efficient Lattice-Based Cryptosystems with Key Dependent Message Security
    Yang, Bo
    Huang, Ruwei
    Zhao, Jianan
    APPLIED SCIENCES-BASEL, 2021, 11 (24):
  • [8] Cloud Security Algorithms
    Pansotra, Ashima
    Singh, Simar Preet
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (10): : 353 - 360
  • [9] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [10] Data Security Frameworks In Cloud
    Devi, T.
    Ganesan, R.
    2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,