An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms

被引:2
|
作者
Njuki, Sam [1 ]
Zhang, Jianbiao [1 ]
Too, Edna C. [1 ]
Richard, Rimiru [2 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing, Peoples R China
[2] Jomo Kenyatta Univ Agr & Technol, Sch Comp Sci & IT, Juja, Kenya
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Cloud computing; Cloud security; Cryptography; Key management; Virtualization;
D O I
10.1145/3242840.3242853
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The need for storage and movement of data in today's ever increasing data usage cannot be overemphasized. As a result, storage and movement of data within the cloud becomes a viable option, even though this is a third party and some of the data may be sensitive. Therefore, the security methods in place have to continually be reviewed so as to get the best method or a combination of methods in this ever changing and demanding field. In this paper, the authors have done a formal assessment and examination of cloud systems key cryptographic algorithms and given a recommendation of the best combination of algorithms as a result of our different parameters of considerations. These parameters include whether they are a stream or block cipher and their key size or the hash value. The authors found out that the most viable cryptographic methods for securing the cloud systems are AES, Blowfish, Diffie-Hellman, RSA and SHA-1 which are from symmetric, asymmetric and hashing cryptographic algorithm. They further noted that a hybrid of the three cryptographic algorithms is more effective than an exclusive use of one cryptographic algorithm. They propose a combination of AES, Diffie-Hellman and SHA-1 algorithm for optimum cloud security.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [1] A Comprehensive Evaluation of Cryptographic Algorithms in Cloud Computing
    Kulshrestha, Vartika
    Verma, Seema
    Challa, C. Rama K.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 32 - 36
  • [2] Cryptographic Strength Evaluation of Key Schedule Algorithms
    Afzal, Shazia
    Yousaf, Muhammad
    Afzal, Humaira
    Alharbe, Nawaf
    Mufti, Muhammad Rafiq
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [3] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
  • [4] Securing Cryptographic Keys in the IaaS Cloud Model
    AlBelooshi, B.
    Salah, K.
    Martin, T.
    Damiani, E.
    2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 397 - 401
  • [5] Session Key Based an Efficient Cryptographic Scheme of Images for Securing Internet of Things
    Vidwans A.
    Ramaiya M.
    SN Computer Science, 4 (5)
  • [6] Key derivation algorithms for monotone access structures in cryptographic file systems
    Srivatsa, Mudhakar
    Liu, Ling
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 347 - +
  • [7] Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers
    Kumar, Gautam
    Lagesse, Brent
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 447 - 454
  • [8] Survey on the Key Management for securing the Cloud
    Pradeep, K., V
    Vijayakumar, V.
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 115 - 121
  • [9] Securing Visual Cryptographic Shares using Public Key Encryption
    Kaur, Kulvinder
    Khemchandani, Vineeta
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1108 - 1113
  • [10] ID-BASED PUBLIC KEY CRYPTOGRAPHIC SYSTEMS
    Cheremushkin, A. V.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2023, (61): : 44 - 85