Public Encryption Techniques for Cloud Computing: Randomness and Performance Testing

Cloud computing has to become the next-generation architecture of IT Enterprise. Clouds are massively complex systems. They can be reduced to simple primitives, that are replicated thousands of times, and common functional units. The complexity of cloud computing create many issues related to security as well as all aspects of Cloud computing. One of the most important issues is data security. Since Clouds typically have single security architecture but has many customers with different demands. The main focus of the proposed work is the data storage security in the cloud and the desktop. Generally, Data security is an important factor for both cloud computing and traditional desktop applications. This is to obtain the highest possible level of privacy. Modern Encryption algorithms play the main role in data security of cloud computing. We present an evaluation for selected eight modern encryption techniques namely: RC4, RC6, MARS, AES, DES, 3DES, Two-Fish, and Blow-Fish at two independent platforms namely; desktop computer and Amazon EC2 Micro Instance cloud computing environment. The evaluation has been performed for those encryption algorithms according to randomness testing by using NIST statistical testing in cloud computing environment. This evaluation uses Pseudo Random Number Generator (PRNG) to determine the most suitable technique and analysis the performance for selected modern encryption techniques. Cryptography algorithms are implemented using Java Cryptography Extensions (JCE). Simulation results are shown to demonstrate the effectiveness of each algorithm. Keywords-Amazon EC2; cloud computing Architecture; NIST

[1]  Alin SUCIU,et al.  GENERATION AND TESTING OF RANDOM NUMBERS FOR CRYPTOGRAPHIC APPLICATIONS , 2012 .

[2]  K. Ramar,et al.  Public key cryptosystems based on chaotic-Chebyshev polynomials , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.

[3]  K. Ramar,et al.  Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[4]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[5]  S. Kim,et al.  On the NIST Statistical Test Suite for Randomness , 2003 .

[6]  Avishek Adhikari,et al.  Introduction to Mathematical Cryptography , 2014 .

[7]  Luis Rodero-Merino,et al.  A break in the clouds: towards a cloud definition , 2008, CCRV.

[8]  Cristina-Loredana Duta,et al.  Randomness Evaluation Framework of Cryptographic Algorithms , 2014 .

[9]  Ken Umeno,et al.  Corrections of the NIST Statistical Test Suite for Randomness , 2004, IACR Cryptol. ePrint Arch..

[10]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[11]  Mohit Bhansali,et al.  Enhancing Cloud Computing Security using AES Algorithm , 2013 .

[12]  Li Dejun,et al.  Research of True Random Number Generator Based on PLL at FPGA , 2012 .

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  William Stallings,et al.  Cryptography and network security , 1998 .

[15]  Dai Yuefa Data Security Model for Cloud Computing , 2009 .

[16]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[17]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .