An Analytical Study for Security Evaluation of Cryptosystems used in Cloud Networking

被引:0
|
作者
Sadkan, Satiar B. [1 ]
Abdulraheem, Farqad H. [2 ]
机构
[1] Univ Babylon, Hillah, Iraq
[2] Tech Coll, Mosul, Iraq
关键词
networking; encryption; cryptographysystem and evaluation;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cloud networking describes a new model for IT services depending on Internet protocols. It contains provisioning of dynamically scalable usually and often virtualized resources. The cloud computing (Networking) Environments have many applicable cryptosystems, like symmetric (Stream Ciphers, Block ciphers - AES), and asymmetric cryptosystems (RSA, Knapsack, ECC) and others like Homomorphic, Identity Based Encryption, Biometric based cryptography. Simultaneously, there are many evaluation approaches existing for evaluation of any chosen crypto system used in cloud, but there is no unique evaluation method for these Cloud Crypto Systems. This paper provides analytical study to evaluate the performance of certain cryptographic systems used in cloud networking environments, these are Symmetric Searchable Encryption (SSE), Asymmetric Searchable Encryption (ASE), Elliptic Curve Crypto (ECC) system, AES algorithm, Homomorphic Encryption, and Identity Based Encryption._ An evaluation table is constructed to display the effective parameters included in each cryptography system from which an evaluation equation is deduced to estimate the location of the system performance from reliable margin.
引用
收藏
页码:157 / 162
页数:6
相关论文
共 50 条
  • [21] An Evaluation of Security Key in Mobile Cloud
    Giri, J. Venkata
    Murty, A. S. R.
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS ON ELECTRONICS, INFORMATION, COMMUNICATION & TECHNOLOGY (RTEICT-2020), 2020, : 265 - 268
  • [22] Quantitative Evaluation Method of Cloud Security
    Zhao, Xinlong
    Zhang, Weishi
    Ma, Wei
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 215 - 225
  • [23] Security Evaluation of Passwords Used on Internet
    Hub, Miloslav
    Capek, Jan
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2011, 5 (03) : 437 - 450
  • [24] EVALUATION OF ANALYTICAL METHODS USED FOR REGULATION
    HORWITZ, W
    JOURNAL OF THE ASSOCIATION OF OFFICIAL ANALYTICAL CHEMISTS, 1982, 65 (03): : 525 - 530
  • [25] An Analytical Model Used in Formation Evaluation
    Funded by National Science Foundation Huang JunqiHuang Junqi Professor School of Resources and Environment Beijing Normal University Beijing China Telo Emailjqhuangbnueducn Open Research Laboratory of Envir
    石油学报, 1998, (04) : 145 - 150
  • [26] The top ten cloud-security practices in next-generation networking
    Halton, Wolf Michael
    Rahman, Syed
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 8 (1-2) : 70 - 84
  • [27] Design and Implementation of Cloud Security Defense System with Software Defined Networking Technologies
    Lai, Sin-Fu
    Su, Hui-Kai
    Hsiao, Wen-Hsu
    Chen, Kim-Joan
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 292 - 297
  • [28] On Artificial Neural Network used in Cloud Computing Security - A Survey
    Nita, Stefania Loredana
    Mihailescu, Marius Iulian
    PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2018,
  • [29] Study on ecological security evaluation of Anhui Province based on normal cloud model
    Gang He
    Jun Ruan
    Environmental Science and Pollution Research, 2022, 29 : 16549 - 16562
  • [30] Study on ecological security evaluation of Anhui Province based on normal cloud model
    He, Gang
    Ruan, Jun
    ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH, 2022, 29 (11) : 16549 - 16562