Security evaluation of cryptosystems used in cloud networks

Cloud networking is the next generation architecture of IT. Clouds are very complex architectures. They have a replicated thousands of times, and common functional units and can be reduced to simple primitives. many issues related to security were created by complexity of cloud networking as well as all aspects of Cloud networking. Data security is one of the most important issues. The Cloud usually has a one security architecture but has many customers with variety requests. There are new risks introduced by clouds, like multi-tenancy, virtualization and data outsourcing in additional to existing security risks related to Cloud service providers (CSPs) and cloud customers (CCs). information security and their conformity with cloud networking security challenges targeted by Several international and industrial standards. Since there is a continuous increase in the field of communication regarding advanced data, there is an increase in need for time and statistical overhead that is associated with the application of cryptographic. Parallelizing the computation of cryptographic algorithms on many-core computing platforms can be a promising approach to reduce the execution time and eventually the energy consumption of such algorithms. In this paper we will analyze and compare a some of cryptosystems security evaluation approaches worked in cloud networking environment and depended on variety parameters to explain these approaches and show how it work in the few last years with the great modifying in cloud and great data growing.