Cloud networking is the next generation architecture of IT. Clouds are very complex architectures. They have a replicated thousands of times, and common functional units and can be reduced to simple primitives. many issues related to security were created by complexity of cloud networking as well as all aspects of Cloud networking. Data security is one of the most important issues. The Cloud usually has a one security architecture but has many customers with variety requests. There are new risks introduced by clouds, like multi-tenancy, virtualization and data outsourcing in additional to existing security risks related to Cloud service providers (CSPs) and cloud customers (CCs). information security and their conformity with cloud networking security challenges targeted by Several international and industrial standards. Since there is a continuous increase in the field of communication regarding advanced data, there is an increase in need for time and statistical overhead that is associated with the application of cryptographic. Parallelizing the computation of cryptographic algorithms on many-core computing platforms can be a promising approach to reduce the execution time and eventually the energy consumption of such algorithms. In this paper we will analyze and compare a some of cryptosystems security evaluation approaches worked in cloud networking environment and depended on variety parameters to explain these approaches and show how it work in the few last years with the great modifying in cloud and great data growing.
[1]
Farqad H. Abdulraheem,et al.
An analytical study for security evaluation of cryptosystems used in cloud networking
,
2013,
2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE).
[2]
Mohie M. Hadhoud,et al.
Performance Evaluation Of New Hybrid Encryption Algorithms To Be Used For Mobile Cloud Computing
,
2014
.
[3]
Kamak Ebadi,et al.
High-Performance Implementation and Evaluation of Blowfish Cryptographic Algorithm on Single-Chip Cloud Computer : A Pipelined Approach
,
2012
.
[4]
Maitreyee Dutta,et al.
Analyzing Cryptographic Algorithms for Secure Cloud Network
,
2014,
ArXiv.
[5]
E. M. Mohamed,et al.
Randomness testing of modern encryption techniques in cloud environment
,
2012,
2012 8th International Conference on Informatics and Systems (INFOS).
[7]
Ataul Aziz Ikram,et al.
Performance Evaluation of RSA Algorithm in Cloud Computing Security
,
2014
.
[8]
Manish Mahajan,et al.
Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms
,
2013
.
[9]
Jagdish Bhatta,et al.
Performance Evaluation of RSA Variants and Elliptic Curve Cryptography on Handheld Devices
,
2011
.
[10]
Sasko Ristov,et al.
A new methodology for security evaluation in cloud computing
,
2012,
2012 Proceedings of the 35th International Convention MIPRO.