A comparative study of applying real-time encryption in cloud computing environments

Faraz Fatemi Moghaddam, Omidreza Karimi, Maen T. Alrashdan
{"title":"A comparative study of applying real-time encryption in cloud computing environments","authors":"Faraz Fatemi Moghaddam, Omidreza Karimi, Maen T. Alrashdan","doi":"10.1109/CloudNet.2013.6710575","DOIUrl":null,"url":null,"abstract":"The rapid growth of cloud computing as a newfound technology and many unclear security issues in it cause many challenges. These challenges are specified in service provider's cloud servers and transmission processes. Accordingly, this paper presents a model based on separate data and key cloud servers and a client-based data encryption service for increasing the reliability in cloud computing environments. In the proposed model, the key generation process is done in a separate cloud application and public and private keys are stored in key cloud servers. Moreover, the encryption and decryption processes are done in client side by a service that named “data encryption service”. For applying this encryption system a comparative study was done by analyzing the strengths and weaknesses of six popular asymmetric key encryption algorithms (i.e. Original RSA, RSA Small-e, RSA Small-d, MREA, E-RSA, and EAMRSA) according to time, key size and security parameters. These algorithms were briefly described and redeveloped in the same situation for the simulation process to investigate the performance in client-based data encryption service. Furthermore, the security analysis was done by reviewing the performance of described algorithms against three popular attacks: Brute Force, Mathematical, and Timing Attack. According to the results E-RSA in the most appropriate algorithm for using in client-based data encryption service by achieving acceleration, accuracy, and security in this service based on compatibility issues in a client side service.","PeriodicalId":262262,"journal":{"name":"2013 IEEE 2nd International Conference on Cloud Networking (CloudNet)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"33","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 2nd International Conference on Cloud Networking (CloudNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CloudNet.2013.6710575","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 33

Abstract

The rapid growth of cloud computing as a newfound technology and many unclear security issues in it cause many challenges. These challenges are specified in service provider's cloud servers and transmission processes. Accordingly, this paper presents a model based on separate data and key cloud servers and a client-based data encryption service for increasing the reliability in cloud computing environments. In the proposed model, the key generation process is done in a separate cloud application and public and private keys are stored in key cloud servers. Moreover, the encryption and decryption processes are done in client side by a service that named “data encryption service”. For applying this encryption system a comparative study was done by analyzing the strengths and weaknesses of six popular asymmetric key encryption algorithms (i.e. Original RSA, RSA Small-e, RSA Small-d, MREA, E-RSA, and EAMRSA) according to time, key size and security parameters. These algorithms were briefly described and redeveloped in the same situation for the simulation process to investigate the performance in client-based data encryption service. Furthermore, the security analysis was done by reviewing the performance of described algorithms against three popular attacks: Brute Force, Mathematical, and Timing Attack. According to the results E-RSA in the most appropriate algorithm for using in client-based data encryption service by achieving acceleration, accuracy, and security in this service based on compatibility issues in a client side service.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云计算环境下实时加密应用的比较研究
云计算作为一种新技术的快速发展以及其中许多不明确的安全问题带来了许多挑战。这些挑战在服务提供商的云服务器和传输过程中都有详细说明。因此,本文提出了一种基于独立数据和关键云服务器的模型,以及一种基于客户端的数据加密服务,以提高云计算环境下的可靠性。在建议的模型中,密钥生成过程在单独的云应用程序中完成,公钥和私钥存储在密钥云服务器中。此外,加密和解密过程由一个名为“数据加密服务”的服务在客户端完成。为了应用该加密系统,根据时间、密钥大小和安全参数,对目前流行的六种非对称密钥加密算法(Original RSA、RSA Small-e、RSA Small-d、MREA、E-RSA和EAMRSA)的优缺点进行了比较研究。对这些算法进行了简要描述,并在相同的情况下进行了重新开发,用于仿真过程,以研究基于客户端的数据加密服务的性能。此外,安全性分析是通过检查所描述的算法对三种流行攻击的性能来完成的:蛮力攻击、数学攻击和定时攻击。根据结果E-RSA在基于客户端的数据加密服务中使用最合适的算法,通过在基于客户端服务的兼容性问题上实现该服务的加速、准确性和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Request dispatching for cheap energy prices in cloud data centers Trust management system for Opportunistic Cloud Services Autonomic scaling of Cloud Computing resources using BN-based prediction models Service-oriented trust and reputation management system for multi-tier cloud Automatic server role identification for cloud infrastructure construction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1