CLOUD QUERY PROCESSING ANALYSIS: ENCRYPTION AND DECRYPTION

被引:7
|
作者
Ali, Zainalabideen [1 ]
Aman, Azana Hafizah Binti Mohd [1 ]
Hassan, Rosilah [1 ]
机构
[1] Natl Univ Malaysia, Fac Informat Sci & Technol, Bangi, Selangor, Malaysia
来源
3C TECNOLOGIA | 2019年 / SI期
关键词
RSA; AES; Processing Time; Cloud Query Processing;
D O I
10.17993/3ctecno.2019.specialissue3.65-75
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The usage of clouds to provide data query services is becoming an attractive solution to services that demand scalability and cost minimization. Despite the huge advantages, cloud consumers require their confidential or delicate data to be safe and secured, because violating their private data would be a great concern that is not tolerable. Therefore, corporations who use the cloud services especially the database-as-a-service have tended to encrypt sensitive data for security and confidentiality purpose. Encrypting data would facilitate protecting private information from any violation by the service provider. Several studies have proposed AES and RSA encryption methods. Yet, each encryption method provides a specific level of security which comes with an opposite level of efficiency. Therefore, this work will examine the performance for both encryption methods. The environment setup consists of Microsoft SQL Server as cloud database simulation, and a Visual Studio platform to simulate the local processing of queries. The performance evaluation parameters are time consumption for encryption and decryption. Overall, the results appeared are not significant as each method has its own benefits.
引用
收藏
页码:65 / 75
页数:11
相关论文
共 50 条
  • [21] On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA
    Shparlinski, IE
    INFORMATION PROCESSING LETTERS, 2004, 92 (03) : 143 - 147
  • [22] Encryption and Decryption of Mobile Security Using AES and GOST Algorithms
    Ilyas, Muhammad
    Naqash, Talha
    Shah, Sajjad Hussain
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 769 - 772
  • [23] Multi-variable Bijective Mapping for Secure Encryption and Decryption
    Sheikh, Nazim Uddin
    Hazra, Tapan Kumar
    Rahman, Hasina
    Mustafi, Kanyasree
    Chakraborty, Ajoy Kumar
    2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 338 - 345
  • [24] Image Encryption/Decryption Design Using NIOSII Soft Core Processor
    Hafsa, Amal
    Sghaier, Anissa
    Yousef, Wajih Elhadj
    Machhout, Mohsen
    Malek, Jihene
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [25] Proposing an Encryption/Decryption Scheme for IoT Communications using Binary-bit Sequence and Multistage Encryption
    Hussain, Iqra
    Negi, Mukesh Chandra
    Pandey, Nitin
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 709 - 713
  • [26] A new compact dual-core architecture for AES encryption and decryption
    Li, Hua
    Li, Jianzhou
    CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2008, 33 (3-4): : 209 - 213
  • [27] Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
    Banik, Subhadeep
    Bogdanov, Andrey
    Regazzoni, Francesco
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 173 - 190
  • [28] Applying Encryption Algorithm for Data Security in Cloud Storage
    Kartit, Zaid
    Azougaghe, Ali
    Kamal Idrissi, H.
    El Marraki, M.
    Hedabou, M.
    Belkasmi, M.
    Kartit, A.
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 141 - 154
  • [29] A Comparison between Symmetric and Asymmetric Key Encryption Algorithm based Decryption Mixnets
    Ahmad, Sahan
    Alam, Kazi Md Rokibul
    Rahman, Habibur
    Tamura, Shinsuke
    2015 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2015, : 194 - 198
  • [30] Fpga Implementation Of Image Encryption And Decryption Using AES 128-Bit
    Priyanka, M. P.
    Prasad, E. Lakshmi
    Reddy, A. R.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 156 - 160