An Analytical Study for Security Evaluation of Cryptosystems used in Cloud Networking

被引:0
|
作者
Sadkan, Satiar B. [1 ]
Abdulraheem, Farqad H. [2 ]
机构
[1] Univ Babylon, Hillah, Iraq
[2] Tech Coll, Mosul, Iraq
关键词
networking; encryption; cryptographysystem and evaluation;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cloud networking describes a new model for IT services depending on Internet protocols. It contains provisioning of dynamically scalable usually and often virtualized resources. The cloud computing (Networking) Environments have many applicable cryptosystems, like symmetric (Stream Ciphers, Block ciphers - AES), and asymmetric cryptosystems (RSA, Knapsack, ECC) and others like Homomorphic, Identity Based Encryption, Biometric based cryptography. Simultaneously, there are many evaluation approaches existing for evaluation of any chosen crypto system used in cloud, but there is no unique evaluation method for these Cloud Crypto Systems. This paper provides analytical study to evaluate the performance of certain cryptographic systems used in cloud networking environments, these are Symmetric Searchable Encryption (SSE), Asymmetric Searchable Encryption (ASE), Elliptic Curve Crypto (ECC) system, AES algorithm, Homomorphic Encryption, and Identity Based Encryption._ An evaluation table is constructed to display the effective parameters included in each cryptography system from which an evaluation equation is deduced to estimate the location of the system performance from reliable margin.
引用
收藏
页码:157 / 162
页数:6
相关论文
共 50 条
  • [31] A quantitative framework for security assurance evaluation and selection of cloud services: a case study
    Ankur Shukla
    Basel Katt
    Muhammad Mudassar Yamin
    International Journal of Information Security, 2023, 22 : 1621 - 1650
  • [32] Evaluation of a Cloud Federation Approach Based on Software Defined Networking
    Koerner, Marc
    Gaul, Constantin
    Kao, Odej
    2015 IEEE 40TH LOCAL COMPUTER NETWORKS CONFERENCE WORKSHOPS (LCN WORKSHOPS), 2015, : 657 - 664
  • [33] A quantitative framework for security assurance evaluation and selection of cloud services: a case study
    Shukla, Ankur
    Katt, Basel
    Yamin, Muhammad Mudassar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1621 - 1650
  • [34] Evaluation of Cloud Computing Offers through Security Risks An Industrial Case Study
    Remiche, Jean-Michel
    Aubert, Jocelyn
    Mayer, Nicolas
    Petrocelli, David
    CLOSER: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2018, : 338 - 345
  • [35] An Intra-Cloud Networking Performance Evaluation on CloudStack Environment
    Vogel, Adriano
    Griebler, Dalvan
    Schepke, Claudio
    Fernandes, Luiz Gustavo
    2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 468 - 472
  • [36] Evaluation of security algorithms used for security processing on DICOM images
    Chen, XM
    Shuai, J
    Zhang, JG
    Huang, HK
    MEDICAL IMAGING 2005: PACS AND IMAGING INFORMATICS, 2005, 5748 : 539 - 547
  • [37] Android Apps Security Evaluation System in the Cloud
    Wang, Hao
    Li, Tao
    Zhang, Tong
    Wang, Jie
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS, AND WORKSHARING, COLLABORATECOM 2015, 2016, 163 : 151 - 160
  • [38] Evaluation of Security Supporting Mechanisms in Cloud Storage
    Albahdal, Abdullah A.
    Alsolami, Fahad
    Alsaadi, Fawaz
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 285 - 292
  • [39] METHOD FOR PROVIDING SECURITY FOR ANALYTICAL BALANCES USED IN ACADEMIC LABORATORY
    BREEDLOVE, CH
    TREVORROW, D
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1976, 172 (SEP3): : 73 - 73
  • [40] Security Evaluation of a Control System Using Named Data Networking
    Perez, Victor
    Garip, Mevlut Turker
    Lam, Silas
    Zhang, Lixia
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,