An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms

被引:2
|
作者
Njuki, Sam [1 ]
Zhang, Jianbiao [1 ]
Too, Edna C. [1 ]
Richard, Rimiru [2 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing, Peoples R China
[2] Jomo Kenyatta Univ Agr & Technol, Sch Comp Sci & IT, Juja, Kenya
来源
PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND SYSTEMS (ICACS 2018) | 2018年
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Cloud computing; Cloud security; Cryptography; Key management; Virtualization;
D O I
10.1145/3242840.3242853
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The need for storage and movement of data in today's ever increasing data usage cannot be overemphasized. As a result, storage and movement of data within the cloud becomes a viable option, even though this is a third party and some of the data may be sensitive. Therefore, the security methods in place have to continually be reviewed so as to get the best method or a combination of methods in this ever changing and demanding field. In this paper, the authors have done a formal assessment and examination of cloud systems key cryptographic algorithms and given a recommendation of the best combination of algorithms as a result of our different parameters of considerations. These parameters include whether they are a stream or block cipher and their key size or the hash value. The authors found out that the most viable cryptographic methods for securing the cloud systems are AES, Blowfish, Diffie-Hellman, RSA and SHA-1 which are from symmetric, asymmetric and hashing cryptographic algorithm. They further noted that a hybrid of the three cryptographic algorithms is more effective than an exclusive use of one cryptographic algorithm. They propose a combination of AES, Diffie-Hellman and SHA-1 algorithm for optimum cloud security.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [31] Hybrid Cryptographic Access Control for Cloud-Based EHR Systems
    Premarathne, Uthpala
    Abuadbba, Alsharif
    Alabdulatif, Abdulatif
    Khalil, Ibrahim
    Tari, Zahir
    Zomaya, Albert
    Buyya, Rajkumar
    IEEE CLOUD COMPUTING, 2016, 3 (04): : 58 - 64
  • [32] Device-Based Isolation for Securing Cryptographic Keys
    Elish, Karim O.
    Deng, Yipan
    Yao, Danfeng
    Kafura, Dennis
    4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 1130 - 1135
  • [33] Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems
    Oliveira, P. R. D.
    Martimiano, L. A. F.
    Feltrim, V. D.
    Zanoni, G. B. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2014, 12 (06) : 1141 - 1148
  • [34] Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
    Krokosz, Tomasz
    Rykowski, Jarogniew
    Zajecka, Malgorzata
    Brzoza-Woch, Robert
    Rutkowski, Leszek
    SENSORS, 2023, 23 (17)
  • [35] Securing KVM-based Cloud Systems via Virtualization Introspection
    Lee, Sheng-Wei
    Yu, Fang
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 5028 - 5037
  • [36] Cloud computing platform: Performance analysis of prominent cryptographic algorithms
    Ajmal, Abdullah
    Ibrar, Sundas
    Amin, Rashid
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15):
  • [37] KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING
    Delgado Barroso, John Manuel
    Joyanes Aguilar, Luis
    Garcia Gundin, Pablo
    KEOD 2010: Proceedings of the International Conference on Knowledge Engineering and Ontology Development, 2010, : 493 - 496
  • [38] The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
    Tutubalin, Pavel Innokentievich
    Mokshin, Vladimir Vasilevich
    2017 SECOND RUSSIA AND PACIFIC CONFERENCE ON COMPUTER TECHNOLOGY AND APPLICATIONS (RPC 2017), 2017, : 180 - 183
  • [39] On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS
    Yoshida, Maki
    Morioka, Sumio
    Obana, Satoshi
    2022 INTERNATIONAL CONFERENCE ON LOCALIZATION AND GNSS (ICL-GNSS), 2022,
  • [40] Cryptographic algorithms for distributed measurement and control systems
    Adamski, Tomasz
    PRZEGLAD ELEKTROTECHNICZNY, 2008, 84 (05): : 273 - 276