An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms

被引:2
|
作者
Njuki, Sam [1 ]
Zhang, Jianbiao [1 ]
Too, Edna C. [1 ]
Richard, Rimiru [2 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing, Peoples R China
[2] Jomo Kenyatta Univ Agr & Technol, Sch Comp Sci & IT, Juja, Kenya
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Cloud computing; Cloud security; Cryptography; Key management; Virtualization;
D O I
10.1145/3242840.3242853
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The need for storage and movement of data in today's ever increasing data usage cannot be overemphasized. As a result, storage and movement of data within the cloud becomes a viable option, even though this is a third party and some of the data may be sensitive. Therefore, the security methods in place have to continually be reviewed so as to get the best method or a combination of methods in this ever changing and demanding field. In this paper, the authors have done a formal assessment and examination of cloud systems key cryptographic algorithms and given a recommendation of the best combination of algorithms as a result of our different parameters of considerations. These parameters include whether they are a stream or block cipher and their key size or the hash value. The authors found out that the most viable cryptographic methods for securing the cloud systems are AES, Blowfish, Diffie-Hellman, RSA and SHA-1 which are from symmetric, asymmetric and hashing cryptographic algorithm. They further noted that a hybrid of the three cryptographic algorithms is more effective than an exclusive use of one cryptographic algorithm. They propose a combination of AES, Diffie-Hellman and SHA-1 algorithm for optimum cloud security.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [21] Securing Ventilators: Integrating Hardware Security Modules with SoftHSM and Cryptographic Algorithms
    Amael, Joshua Tito
    Istiyanto, Jazi Eko
    Hakim, Zaidan
    Sari, Rifda Hakima
    Frisky, Aufaclav Zatu Kusuma
    Natan, Oskar
    2024 33RD INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, ISIE 2024, 2024,
  • [22] Securing Cloud Data Under Key Exposure
    Karame, Ghassan O.
    Soriente, Claudio
    Lichota, Krzysztof
    Capkun, Srdjan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 838 - 849
  • [23] Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
    Pereira, Geovandro C. C. F.
    Alves, Renan C. A.
    da Silva, Felipe L.
    Azevedo, Roberto M.
    Albertini, Bruno C.
    Margi, Cintia B.
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [24] Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Pandey, Nitin
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 529 - 534
  • [25] Securing Balise-based Train Control Systems using Cryptographic Random Fountains
    Harshan, J.
    Chang, Sang-Yoon
    Kang, Seungmin
    Hu, Yih-Chun
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 405 - 410
  • [26] Secure Data Storage in Cloud using Cryptographic Algorithms
    Kodumru, Nagasai Lohitha
    Supriya, M.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [27] Preventing Cryptographic Key Leakage in Cloud Virtual Machines
    Pattuk, Erman
    Kantarcioglu, Murat
    Lin, Zhiqiang
    Ulusoy, Huseyin
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 703 - 718
  • [28] Benchmarking Cryptographic Schemes for Securing Public Cloud Storages (Practical Experience Report)
    Contiu, Stefan
    Leblond, Emmanuel
    Reveillere, Laurent
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2017, 2017, 10320 : 163 - 176
  • [29] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [30] Securing digital authentication with cryptographic innovations in intrinsic verification systems
    Gowda, V. Dankan
    Suneel, Sajja
    Rahman, Mirzanur
    Das, Gobinda Chandra
    Kumar, R. Senthil
    Prasad, K. D. V.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 317 - 328