[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3242840.3242853acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicacsConference Proceedingsconference-collections
research-article

An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms

Published: 27 July 2018 Publication History

Abstract

The need for storage and movement of data in today's ever increasing data usage cannot be overemphasized. As a result, storage and movement of data within the cloud becomes a viable option, even though this is a third party and some of the data may be sensitive. Therefore, the security methods in place have to continually be reviewed so as to get the best method or a combination of methods in this ever changing and demanding field. In this paper, the authors have done a formal assessment and examination of cloud systems key cryptographic algorithms and given a recommendation of the best combination of algorithms as a result of our different parameters of considerations. These parameters include whether they are a stream or block cipher and their key size or the hash value. The authors found out that the most viable cryptographic methods for securing the cloud systems are AES, Blowfish, Diffie-Hellman, RSA and SHA-1 which are from symmetric, asymmetric and hashing cryptographic algorithm. They further noted that a hybrid of the three cryptographic algorithms is more effective than an exclusive use of one cryptographic algorithm. They propose a combination of AES, Diffie-Hellman and SHA-1 algorithm for optimum cloud security.

References

[1]
S. Njuki, J. Zhang, and E. Too, "Analysis of Virtual Machine Migration Security Architectures in Cloud Computing," vol. 8, no. 10, pp. 1753--1763, 2017.
[2]
S. K. Majhi, "An Authentication Framework for Securing Virtual Machine Migration," pp. 1283--1286, 2016.
[3]
L. Mishra, "Secure Cloud Computing with RC4 Encryption and Attack Detection Mechanism," vol. 117, no. 14, pp. 40--45, 2015.
[4]
R. Dogra, "Improvement of Cloud Security Efficiency by Reducing Data Size and Computational Time Using ECDH, AES, BlowFish & PSO," vol. 8, no. 2, pp. 136--141, 2017.
[5]
P. Salim, A. Abbas, and M. Qasim, "Improving Data Storage Security in Cloud Computing Using RC6 Algorithm," vol. 19, no. 5, pp. 51--56, 2017.
[6]
S. Singh, M. T. Scholar, T. Nafis, and A. Sethi, "Cloud Computing: Security Issues & Solution," vol. 13, no. 6, pp. 1419--1429, 2017.
[7]
G. K. Kumar and M. Gobi, "Comparative Study on Blowfish & Twofish Algorithms for Cloud Security," vol. 3, no. 9, pp. 1--11, 2017.
[8]
M. S. Abutaha and A. A. Amro, "Using AES, RSA, SHA1 for Securing Cloud," no. April, 2014.
[9]
M. Gopinathan, "Elliptic curve cryptography in cloud computing security," 2015.
[10]
B. T. Reddy, K. B. Chowdappa, and S. R. Reddy, "Cloud Security using Blowfish and Key Management Encryption Algorithm," no. 6, pp. 59--62, 2015.
[11]
A. Bhardwaj, G. V. B. Subrahmanyam, V. Avasthi, and H. Sastry, "Security Algorithms for Cloud Computing," in Procedia Computer Science, 2016, vol. 85, pp. 535--542.
[12]
S. Bhute and S. K. Arjaria, "An efficient AES and RC6 based cloud-user data security with attack detection mechanism," vol. 3, no. 21, 2016.
[13]
K. H. Patel and S. S. Patel, "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing Alpha College of Engineering and Technology Khatraj, Kalol," vol. 4, no. 1, pp. 543--548, 2016.
[14]
D. Thiyagarajan and G. Ramachandrarao, "Ensuring Security for Data Storage in Cloud Computing using HECC- ElGamal Cryptosystem and GSO Optimization," Int. J. Intell. Eng. Syst., vol. 10, no. 5, pp. 115--124, 2017.
[15]
A. P. S and K. Subhashri, "Securing Outsourced Data On Cloud Using ElGamal Cryptosystem," pp. 53--56, 2017.
[16]
N. Chandel, "Creation of secure cloud environment using Creation of Secure Cloud Environment using RC6," no. June, pp. 6--8, 2016.
[17]
P. Devi, "Data Security in Cloud Computing Based On Blowfish with Md5 Method," vol. 3, pp. 149--154, 2017.
[18]
G. K. Mythili and D. G. Priya, "Data Security in Cloud using Blowfish Algorithm," vol. 2, no. 9, pp. 523--525, 2014.
[19]
K. L. Hemalatha and C. V Sreevathsa, "Providing Better Security in Cloud Computing Environment using Twofish Encryption," pp. 12--15, 2016.
[20]
A. Chaudhary, R. Thakur, and M. Mann, "SECURITY IN CLOUD COMPUTING BY USING HOMOMORPHIC ENCRYPTION SCHEME WITH DIFFIE-HELLMAN ALGORITHM," pp. 44--47, 2014.
[21]
A. O. Adetunmbi and O. S. Adewale, "Elliptic Curve Cryptography for Securing Cloud Computing Applications," vol. 66, no. 23, pp. 10--17, 2013.
[22]
S. R. Lenka and B. Nayak, "Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm," vol. 2, no. 3, pp. 60--64, 2014.
[23]
M. Shah and A. S. Shah, "Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Computing," Int. J. Grid Distrib. Comput., vol. 9, no. 7, pp. 13--22, 2016.
[24]
A. Sachdev, "Enhancing Cloud Computing Security using AES Algorithm," Int. J. Comput. Appl., vol. 67, no. 9, pp. 19--23, 2013.

Cited By

View all
  • (2021)Enhancing Data Protection in Cloud Computing using Key Derivation based on Cryptographic Technique2021 5th International Conference on Computing Methodologies and Communication (ICCMC)10.1109/ICCMC51019.2021.9418486(291-299)Online publication date: 8-Apr-2021
  • (2019)Hybrid Cryptosystems for Protecting IoT Smart Devices with Comparative Analysis and EvaluationProceedings of the Future Technologies Conference (FTC) 201910.1007/978-3-030-32520-6_62(862-876)Online publication date: 13-Oct-2019
  • (2019)Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart DevicesSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-030-24900-7_1(5-19)Online publication date: 11-Jul-2019

Index Terms

  1. An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICACS '18: Proceedings of the 2nd International Conference on Algorithms, Computing and Systems
    July 2018
    245 pages
    ISBN:9781450365093
    DOI:10.1145/3242840
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Xi'an Jiaotong-Liverpool University: Xi'an Jiaotong-Liverpool University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 July 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cloud computing
    2. Cloud security
    3. Cryptography
    4. Key management
    5. Virtualization

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Specialized Research Fund

    Conference

    ICACS '18

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Enhancing Data Protection in Cloud Computing using Key Derivation based on Cryptographic Technique2021 5th International Conference on Computing Methodologies and Communication (ICCMC)10.1109/ICCMC51019.2021.9418486(291-299)Online publication date: 8-Apr-2021
    • (2019)Hybrid Cryptosystems for Protecting IoT Smart Devices with Comparative Analysis and EvaluationProceedings of the Future Technologies Conference (FTC) 201910.1007/978-3-030-32520-6_62(862-876)Online publication date: 13-Oct-2019
    • (2019)Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart DevicesSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-030-24900-7_1(5-19)Online publication date: 11-Jul-2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media