CLOUD QUERY PROCESSING ANALYSIS: ENCRYPTION AND DECRYPTION

被引:7
|
作者
Ali, Zainalabideen [1 ]
Aman, Azana Hafizah Binti Mohd [1 ]
Hassan, Rosilah [1 ]
机构
[1] Natl Univ Malaysia, Fac Informat Sci & Technol, Bangi, Selangor, Malaysia
来源
3C TECNOLOGIA | 2019年 / SI期
关键词
RSA; AES; Processing Time; Cloud Query Processing;
D O I
10.17993/3ctecno.2019.specialissue3.65-75
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The usage of clouds to provide data query services is becoming an attractive solution to services that demand scalability and cost minimization. Despite the huge advantages, cloud consumers require their confidential or delicate data to be safe and secured, because violating their private data would be a great concern that is not tolerable. Therefore, corporations who use the cloud services especially the database-as-a-service have tended to encrypt sensitive data for security and confidentiality purpose. Encrypting data would facilitate protecting private information from any violation by the service provider. Several studies have proposed AES and RSA encryption methods. Yet, each encryption method provides a specific level of security which comes with an opposite level of efficiency. Therefore, this work will examine the performance for both encryption methods. The environment setup consists of Microsoft SQL Server as cloud database simulation, and a Visual Studio platform to simulate the local processing of queries. The performance evaluation parameters are time consumption for encryption and decryption. Overall, the results appeared are not significant as each method has its own benefits.
引用
收藏
页码:65 / 75
页数:11
相关论文
共 50 条
  • [41] AES Encryption and Decryption Algorithm for High-Speed Design FPGA-Based
    Zhou Yong-hong
    Shao Jin-xiang
    Xiao Shun-wen
    Tang Zheng-ming
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 266 - +
  • [42] A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services
    Khanezaei, Nasrin
    Hanapi, Zurina Mohd
    2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014), 2014, : 58 - 62
  • [43] Distributed query optimization strategies for cloud environment
    Mostafa R. Kaseb
    Samar Sh. Haytamy
    Rasha M. badry
    Journal of Data, Information and Management, 2021, 3 (4): : 271 - 279
  • [44] A novel round function architecture for AES encryption/decryption utilizing look-up table
    Wang, JF
    Chang, SW
    Lin, PC
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 132 - 136
  • [45] A high performance ST-Box based unified AES encryption/decryption architecture on FPGA
    Kundi, D. -S.
    Aziz, Arshad
    Ikram, Nassar
    MICROPROCESSORS AND MICROSYSTEMS, 2016, 41 : 37 - 46
  • [46] An analytical approach to the design of parallel block cipher encryption/decryption : A CPU/GPU case study
    Barlas, Gerassimos
    Hassan, Ahmed
    Al Jundi, Yasser
    PROCEEDINGS OF THE 19TH INTERNATIONAL EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2011, : 247 - 251
  • [47] The Performance Impact of Encryption in an Asynchronous Cloud Environment
    Klein, Andrei F.
    Stefanescu, Mihai
    Saied, Alan
    Swakhoven, Kurt
    2016 INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2016,
  • [48] Network Data Encryption Strategy for Cloud Computing
    Chang Xue-zhou
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 693 - 697
  • [49] Secure Cloud Storage Using AES Encryption
    Babitha, M. P.
    Babu, K. R. Remesh
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 859 - 864
  • [50] A Hybrid Encryption Scheme for Securing Images in the Cloud
    Kulkarni, Pallavi
    Khanai, Rajashri
    Bindagi, Gururaj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 795 - 800