Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS

被引:0
|
作者
Dawson J.K. [1 ]
Twum F. [2 ]
Acquah J.B.H. [3 ]
Missah Y.M. [4 ]
机构
[1] Computer Science Department, Sunyani Technical University, Sunyani
[2] Computer Science Department, Kwame Nkrumah University of Science and Technology, Kumasi
[3] Department of Computer Science, Kwame Nkrumah University of Science and Technology (KNUST)
来源
J. Cyber Secur. Mobil. | 2024年 / 2卷 / 265-282期
关键词
cryptography; decryption; encryption; execution time; Non-deterministic; throughput;
D O I
10.13052/jcsm2245-1439.1324
中图分类号
学科分类号
摘要
Due to the recent explosion in the amount of data being created by various social media platforms, e-commerce websites, and other businesses, a paradigm shift from on-site data centers to the cloud is required. Concerns about privacy and secrecy have been a major obstacle to the mainstream adoption of cloud computing. The best approach to protect the confidentiality and privacy of cloud data is by using cryptographic techniques. Researchers have developed several cryptographic algorithms, but they all have lengthy, linear, predictable, memory-intensive execution times. The performance of the CPU, memory, run-time trend, and throughput of the three cryptographic schemes: Enhanced RSA (ERSA), Non-Deterministic Cryptographic Scheme (NCS), and Enhanced Homomorphic Scheme (EHS) are compared using RAsys. The experiment’s results demonstrated that NCS and EHS produced non-linear and non-deterministic run times. Again, NCS and EHS produced the lowest throughput and memory consumption for text and numeric data types when data sizes of 5n∗102 (KB (∈ 1, 2, 4, 10, 20, 40) were processed. However, ERSA produced a run-time trend that was deterministic, linear, and predictable © 2024 River Publishers.
引用
收藏
页码:265 / 282
页数:17
相关论文
共 2 条
  • [1] Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend
    Dawson, John Kwao
    Frimpong, Twum
    Acquah, James Benjamin Hayfron
    Missah, Yaw Marfo
    PLOS ONE, 2023, 18 (09):
  • [2] Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
    Thabit, Fursan
    Can, Ozgu
    Wani, Rizwan Uz Zaman
    Qasem, Mohammed Ali
    Thorat, S. B.
    Alkhzaimi, Hoda A. A.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):