An Analytical Study for Security Evaluation of Cryptosystems used in Cloud Networking

被引:0
|
作者
Sadkan, Satiar B. [1 ]
Abdulraheem, Farqad H. [2 ]
机构
[1] Univ Babylon, Hillah, Iraq
[2] Tech Coll, Mosul, Iraq
关键词
networking; encryption; cryptographysystem and evaluation;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cloud networking describes a new model for IT services depending on Internet protocols. It contains provisioning of dynamically scalable usually and often virtualized resources. The cloud computing (Networking) Environments have many applicable cryptosystems, like symmetric (Stream Ciphers, Block ciphers - AES), and asymmetric cryptosystems (RSA, Knapsack, ECC) and others like Homomorphic, Identity Based Encryption, Biometric based cryptography. Simultaneously, there are many evaluation approaches existing for evaluation of any chosen crypto system used in cloud, but there is no unique evaluation method for these Cloud Crypto Systems. This paper provides analytical study to evaluate the performance of certain cryptographic systems used in cloud networking environments, these are Symmetric Searchable Encryption (SSE), Asymmetric Searchable Encryption (ASE), Elliptic Curve Crypto (ECC) system, AES algorithm, Homomorphic Encryption, and Identity Based Encryption._ An evaluation table is constructed to display the effective parameters included in each cryptography system from which an evaluation equation is deduced to estimate the location of the system performance from reliable margin.
引用
收藏
页码:157 / 162
页数:6
相关论文
共 50 条
  • [1] Security Evaluation of Cryptosystems used in Cloud Networks
    Sadkhan, Sattar B.
    Abdulraheem, Farqad H.
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [2] An evaluation methodology for the security of cryptosystems
    Laabidi, Selma
    Robisson, Bruno
    Agoyan, Michel
    PRIME: 2008 PHD RESEARCH IN MICROELECTRONICS AND ELECTRONICS, PROCEEDINGS, 2008, : 113 - 115
  • [3] Challenges for Cloud Networking Security
    Schoo, Peter
    Fusenig, Volker
    Souza, Victor
    Melo, Marcio
    Murray, Paul
    Debar, Herve
    Medhioub, Houssem
    Zeghlache, Djamal
    MOBILE NETWORKS AND MANAGEMENT, 2010, 68 : 298 - +
  • [4] Analytical Modelling and Performance Evaluation of Security Issues for Cloud Computing
    Caglar, Ersin
    Kirsal, Yonal
    2019 27TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2019,
  • [5] Security Requirements in a Federated Cloud Networking Architecture
    Massonet, Philippe
    Levin, Anna
    Celesti, Antonio
    Villari, Massimo
    ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 79 - 88
  • [6] Load balancing techniques used in cloud networking and their applicability in local networking
    Ionescu, Valeriu Manuel
    PROCEEDINGS OF THE 2015 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2015, : S63 - S68
  • [7] Security Evaluation in Cloud
    Mirkovic, Orlan
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1088 - 1093
  • [8] Security Solution for Cloud Based on Software Defined Networking
    Patrascu, Naina
    Dartu, Alina
    Cornea, Tudor
    Obreja, Serban Georgica
    Ciurezu, Marina
    Brumaru, Alexandru
    2021 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE BLACKSEACOM), 2021, : 37 - 42
  • [9] Comparable and Analytical Study Between Some Security Issues in Cloud Computing
    Abou El-Seoud, M. Samir
    El-Sofany, Hosam F.
    Taj-Eddin, Islam A. T. F.
    TEACHING AND LEARNING IN A DIGITAL WORLD, 2018, 716 : 526 - 539
  • [10] Biometric Cryptosystems based Fuzzy Commitment Scheme: A Security Evaluation
    Lafkih, Maryam
    Mikram, Mounia
    Ghouzali, Sanaa
    El Haziti, Mohamed
    Aboutajdine, Driss
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 443 - 449