In the context of cloud computing two interrelated problems (awareness of power consumption and information safety of mobile devices) are highly important issues. The paper presents some results of experiments we have carried with 4 standard cryptography-based algorithms (AES, RC2, DES and 3DES) aiming to identify their greediness for energy, as well as to collect data for identification of relationships among various characteristics (folder size, information type, security level, algorithm type, encryption/decryption mode, performance/energy, etc.). The experiment is based on our previously developed methodology. The basic results are: 1) performance/energy characteristics are linearly dependent on the folder size and practically independent upon the information type (document or picture), 2) decryption requires much more energy resources then encryption for some class of algorithms.
[1]
Jong Sou Park,et al.
Cloud computing: future solution for e-governance
,
2009,
ICEGOV '09.
[2]
Srivaths Ravi,et al.
Securing mobile appliances: new challenges for the system designer
,
2003,
2003 Design, Automation and Test in Europe Conference and Exhibition.
[3]
Frank Mueller,et al.
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
,
2003,
CASES '03.
[4]
Kang G. Shin,et al.
Detecting energy-greedy anomalies and mobile malware variants
,
2008,
MobiSys '08.
[5]
Vytautas Štuikys,et al.
Application-Level Energy Consumption In Communication Models For Handhelds
,
2009
.