CLOUD QUERY PROCESSING ANALYSIS: ENCRYPTION AND DECRYPTION

被引:7
作者
Ali, Zainalabideen [1 ]
Aman, Azana Hafizah Binti Mohd [1 ]
Hassan, Rosilah [1 ]
机构
[1] Natl Univ Malaysia, Fac Informat Sci & Technol, Bangi, Selangor, Malaysia
来源
3C TECNOLOGIA | 2019年 / SI期
关键词
RSA; AES; Processing Time; Cloud Query Processing;
D O I
10.17993/3ctecno.2019.specialissue3.65-75
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The usage of clouds to provide data query services is becoming an attractive solution to services that demand scalability and cost minimization. Despite the huge advantages, cloud consumers require their confidential or delicate data to be safe and secured, because violating their private data would be a great concern that is not tolerable. Therefore, corporations who use the cloud services especially the database-as-a-service have tended to encrypt sensitive data for security and confidentiality purpose. Encrypting data would facilitate protecting private information from any violation by the service provider. Several studies have proposed AES and RSA encryption methods. Yet, each encryption method provides a specific level of security which comes with an opposite level of efficiency. Therefore, this work will examine the performance for both encryption methods. The environment setup consists of Microsoft SQL Server as cloud database simulation, and a Visual Studio platform to simulate the local processing of queries. The performance evaluation parameters are time consumption for encryption and decryption. Overall, the results appeared are not significant as each method has its own benefits.
引用
收藏
页码:65 / 75
页数:11
相关论文
共 9 条
[1]  
Albadri Hussein, 2016, Journal of Theoretical and Applied Information Technology, V93, P412
[2]  
Aman A. H. M., 2019, 3 INT MULT C ENG SCI
[3]  
Amini R, 2018, INT J ADV COMPUT SC, V9, P189
[4]  
Ghaleb HSM, 2017, INT CONF ELECT ENG
[5]  
Gupta P, 2018, PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, P163, DOI 10.1109/CONFLUENCE.2018.8442788
[6]  
Ibrahim R., 2019, 3 INT MULT C ENG SCI
[7]  
Modak A, 2018, PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P7, DOI 10.1109/ICICCT.2018.8473104
[8]  
Singh M, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P708, DOI 10.1109/CCAA.2015.7148468
[9]   A Study on Data Storage Security Issues in Cloud Computing [J].
Vurukonda, Naresh ;
Rao, B. Thirumala .
2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 :128-135