Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack

In this paper, the implementation of the General Secure Cloud Storage Protocol is carried out and instantiated by a multiplicatively Homomorphic Encryption Scheme (HES). The protocol provides a system for secure storage of data over the cloud, thereby allowing the client to carry out the operational tasks on it efficiently. The work focuses on the execution of five major modules of the protocol. We also evaluate the performance of the protocol with respect to the computation cost of these modules on the basis of different security parameters and datasets by conducting a series of experiments. The cloud was built using OpenStack and the data were outsourced from the client’s system to the cloud to study the security features and performance metrics when adopting the cloud environment.

[1]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[2]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[3]  Yang Lu,et al.  Privacy preserving distributed optimization using homomorphic encryption , 2018, Autom..

[4]  Xun Yi,et al.  Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption , 2020, J. Parallel Distributed Comput..

[5]  Hazrat Ali,et al.  Distributed File Sharing and Retrieval Model for Cloud Virtual Environment , 2019 .

[6]  Marjan Kuchaki Rafsanjani,et al.  A survey on security challenges in cloud computing: issues, threats, and solutions , 2020, The Journal of Supercomputing.

[7]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[8]  Hikmat Ullah Khan,et al.  An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries , 2018, Engineering, Technology & Applied Science Research.

[9]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[10]  Naresh Vurukonda,et al.  A Study on Data Storage Security Issues in Cloud Computing , 2016 .

[11]  Abdelkarim Erradi,et al.  Paillier's encryption: Implementation and cloud applications , 2015, 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR).

[12]  Noman Islam,et al.  Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment , 2021, Comput. Sci. Rev..

[13]  Dehua Zhou,et al.  Secure outsourced calculations with homomorphic encryption , 2018, Advanced Computing: An International Journal.

[14]  Chengsheng Yuan,et al.  An effective comparison protocol over encrypted data in cloud computing , 2019, J. Inf. Secur. Appl..

[15]  Abed Ellatif Samhat,et al.  Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications , 2017, J. Inf. Secur. Appl..

[16]  Pan Jun Sun,et al.  Security and privacy protection in cloud computing: Discussions and challenges , 2020, J. Netw. Comput. Appl..

[17]  Mauro Conti,et al.  A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..

[18]  Pan Yang,et al.  Data Security and Privacy Protection for Cloud Storage: A Survey , 2020, IEEE Access.

[19]  Sadie Creese,et al.  Insider Attacks in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[20]  Yanjiao Chen,et al.  A general framework to design secure cloud storage protocol using homomorphic encryption scheme , 2017, Comput. Networks.