An Analytical Study for Security Evaluation of Cryptosystems used in Cloud Networking

被引:0
作者
Sadkan, Satiar B. [1 ]
Abdulraheem, Farqad H. [2 ]
机构
[1] Univ Babylon, Hillah, Iraq
[2] Tech Coll, Mosul, Iraq
来源
2013 FIRST INTERNATIONAL SCIENTIFIC CONFERENCE ON ELECTRICAL, COMMUNICATION, COMPUTER, POWER, AND CONTROL ENGINEERING (ICECCPCE'13) | 2013年
关键词
networking; encryption; cryptographysystem and evaluation;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cloud networking describes a new model for IT services depending on Internet protocols. It contains provisioning of dynamically scalable usually and often virtualized resources. The cloud computing (Networking) Environments have many applicable cryptosystems, like symmetric (Stream Ciphers, Block ciphers - AES), and asymmetric cryptosystems (RSA, Knapsack, ECC) and others like Homomorphic, Identity Based Encryption, Biometric based cryptography. Simultaneously, there are many evaluation approaches existing for evaluation of any chosen crypto system used in cloud, but there is no unique evaluation method for these Cloud Crypto Systems. This paper provides analytical study to evaluate the performance of certain cryptographic systems used in cloud networking environments, these are Symmetric Searchable Encryption (SSE), Asymmetric Searchable Encryption (ASE), Elliptic Curve Crypto (ECC) system, AES algorithm, Homomorphic Encryption, and Identity Based Encryption._ An evaluation table is constructed to display the effective parameters included in each cryptography system from which an evaluation equation is deduced to estimate the location of the system performance from reliable margin.
引用
收藏
页码:157 / 162
页数:6
相关论文
共 6 条
  • [1] Security Evaluation of Cryptosystems used in Cloud Networks
    Sadkhan, Sattar B.
    Abdulraheem, Farqad H.
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [2] Study of Cloud Security in Hyper-scalers
    Panjwani, Megha
    De, Suman
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 29 - 34
  • [3] A study on high speed networking and distributed security system
    Kim, Seoksoo
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1690 - 1693
  • [4] Study on Cloud Security Risk and Remedy
    Aich, Asish
    Sen, Alo
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (02): : 155 - 165
  • [5] Evaluation of The faults of Data Security and Privacy in the Cloud Computing
    Waleed, Al-Museelem
    Li Chunlin
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1838 - 1843
  • [6] To Increase Security and Privacy, the QAES Encryption Algorithm is used for Storage of Data for Cloud Computing
    Rani, Geetha E.
    Chetana, D. T.
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,