An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms

被引:2
|
作者
Njuki, Sam [1 ]
Zhang, Jianbiao [1 ]
Too, Edna C. [1 ]
Richard, Rimiru [2 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing, Peoples R China
[2] Jomo Kenyatta Univ Agr & Technol, Sch Comp Sci & IT, Juja, Kenya
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Cloud computing; Cloud security; Cryptography; Key management; Virtualization;
D O I
10.1145/3242840.3242853
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The need for storage and movement of data in today's ever increasing data usage cannot be overemphasized. As a result, storage and movement of data within the cloud becomes a viable option, even though this is a third party and some of the data may be sensitive. Therefore, the security methods in place have to continually be reviewed so as to get the best method or a combination of methods in this ever changing and demanding field. In this paper, the authors have done a formal assessment and examination of cloud systems key cryptographic algorithms and given a recommendation of the best combination of algorithms as a result of our different parameters of considerations. These parameters include whether they are a stream or block cipher and their key size or the hash value. The authors found out that the most viable cryptographic methods for securing the cloud systems are AES, Blowfish, Diffie-Hellman, RSA and SHA-1 which are from symmetric, asymmetric and hashing cryptographic algorithm. They further noted that a hybrid of the three cryptographic algorithms is more effective than an exclusive use of one cryptographic algorithm. They propose a combination of AES, Diffie-Hellman and SHA-1 algorithm for optimum cloud security.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [41] Cryptographic Key Distribution Protocol with Trusted Platform Module for Securing In-vehicle Communications
    Genge, Bela
    Haller, Piroska
    15TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, 2022, 386 : 796 - 807
  • [42] A FRAMEWORK FOR SECURE CRYPTOGRAPHIC KEY MANAGEMENT SYSTEMS
    Varalakshmi, P.
    Shajina, A. R.
    Kanimozhi, T.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 319 - 323
  • [43] Investigating The Impact Of Epilepsy On EEG-based Cryptographic Key Generation Systems
    Nguyen, Dang
    Tran, Dat
    Sharma, Dharmendra
    Ma, Wanli
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 177 - 185
  • [44] A Study on the Impact of Alcoholism on EEG-based Cryptographic Key Generation Systems
    Nguyen, Dang
    Tran, Dat
    Sharma, Dharmendra
    2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2020, : 79 - 85
  • [45] Realization of quadrilateral meshes partition key algorithms based on cloud data
    Wu, Lijuan
    Journal of Computational Information Systems, 2010, 6 (05): : 1545 - 1554
  • [46] Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
    Rahul, B.
    Kuppusamy, K.
    IETE JOURNAL OF RESEARCH, 2023, 69 (09) : 6053 - 6064
  • [47] A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
    Can, Ozgu
    Thabit, Fursan
    Aljahdali, Asia Othman
    Al-Homdy, Sharaf
    Alkhzaimi, Hoda A.
    CYBERNETICS AND SYSTEMS, 2023,
  • [48] In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security
    Khan, Najeeb Ahmad
    Panchal, V. K.
    Tanweer, Safdar
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 27 - 41
  • [49] Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems
    Kim, Byeori
    Choi, Minseong
    Youn, Taek-Young
    Yi, Jeong Hyun
    Cho, Haehyun
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3725 - 3742
  • [50] Cloud Storage Cost Modeling for Cryptographic File Systems
    Storch, Mauro
    De Rose, Cesar A. F.
    2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 9 - 14