CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Public Encryption Techniques for Cloud Computing: Randomness and Performance Testing

by Ayman Helmy Mohamed, Aliaa A.A. Youssif, Atef Z. Ghalwash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Number 6
Year of Publication: 2016
Authors: Ayman Helmy Mohamed, Aliaa A.A. Youssif, Atef Z. Ghalwash
10.5120/ijca2016908441

Ayman Helmy Mohamed, Aliaa A.A. Youssif, Atef Z. Ghalwash . Public Encryption Techniques for Cloud Computing: Randomness and Performance Testing. International Journal of Computer Applications. 136, 6 ( February 2016), 4-10. DOI=10.5120/ijca2016908441

@article{ 10.5120/ijca2016908441,
author = { Ayman Helmy Mohamed, Aliaa A.A. Youssif, Atef Z. Ghalwash },
title = { Public Encryption Techniques for Cloud Computing: Randomness and Performance Testing },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 136 },
number = { 6 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 4-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume136/number6/24155-2016908441/ },
doi = { 10.5120/ijca2016908441 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:36:17.224947+05:30
%A Ayman Helmy Mohamed
%A Aliaa A.A. Youssif
%A Atef Z. Ghalwash
%T Public Encryption Techniques for Cloud Computing: Randomness and Performance Testing
%J International Journal of Computer Applications
%@ 0975-8887
%V 136
%N 6
%P 4-10
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing becomes the next-generation architecture of IT Enterprises. Cloud computing is a technology. It enables clients to use high-end services in a form of software as a service. These reside on different servers all over the world. There are many security threats in cloud computing. Data security is one of them. Data security raises client concerns. There are many issues of data security. It named maintenance of data integrity, data hiding and data safety. These threats dominate clients concerns when the issue of cloud come up. Cloud computing has a big data. Traditional encryption method is time-consuming in this environment. Cloud computing has a single security architecture. It has also many customers with different demands of security. In this case, data security is considered one of the most important issues in cloud computing. The proposed work focused on accessing data securely in cloud and desktop environment. It depends on public key cryptosystem. Generally, Data security is an important factor for both cloud computing and traditional desktop applications. Client needs to have the highest possible level of privacy. Public key cryptosystem is a good candidate for this purpose. It plays a vital role in cloud computing security and desktop. The paper presents an evaluation for selected public key cryptosystem techniques. It named ElGamal cryptosystem, modified chaotic cryptosystem and chaotic cryptosystem. A modified chaotic cryptosystem was presented. The modification enabled the same message to have different cipher version. The experiments implemented at two independent platforms namely desktop computer and Amazon EC2 Micro Instance cloud computing environment. In this paper, the selected algorithms compared according to randomness testing. A standardized NIST statistical testing is used in both desktop environment and cloud computing environment. The algorithms are implemented using python charm Cryptography framework. Simulation results are shown to demonstrate the effectiveness of each algorithm. NIST statistical tests are used to determine suitable technique for cloud computing environment and desktop. It also used to study the performance of the selected encryption techniques in both environment.

References
  1. A.S. C. S. ,. O. C. Kinga MÁRTON, "Generation and testing of random numbers for cryptographic applications," proceedings of the romaanian academy, Series A,, vol. 13, no. 4, p. 368–377, 2012.
  2. P. Z. Li Dejuna, "Research of True Random Number Generator Based on PLL at FPGA," Elsevier Ltd., vol. 29, p. 2432 – 2437, 2012.
  3. B.-C. M. F.-A. V. L. G. Cristina-Loredana Duta, "Randomness evaluation framework of cryptographic algorithms," International Journal on Cryptography and Information Security (IJCIS), vol. 4, no. 1, March 2014.
  4. J. S. L. V. AndrewRukhin, "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications," NIST Special Publication 800-22, 2010.
  5. K. U. ,. a. A. H. Song-Ju KIM, "On the NIST Statistical Test Suite for Randomness," information and communication engineers, 2003.
  6. E. M. M. H. S. A.-k. Sherif El-etriby, "Modern Encryption Techniques for Cloud Computing Randomness and Performance Testing," ICCIT, pp. 800-805, 2012.
  7. P. K. H. G. H. P. Krunal Suthar, "Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment," International Journal of Computer Applications, vol. 60, no. 19, p. 0975 – 8887, December 2012.
  8. M. B. Abha Sachdev, "Enhancing Cloud Computing Security using AES Algorithm," International Journal of Computer Applications (0975 – 8887), vol. 67, no. 9, April 2013.
  9. D. p. V.V.Jog, "Security of outsourced data in cloud using dynamic auditing," international jornal of computer science Engineering and Techbology (IJCSET), vol. 4, no. 2, pp. 392-394, Dec 2014.
  10. J. P. J. H. S. Jeffrey Hoffstein, "An Introduction to Mathematical Cryptography," Springer: Book, 2008.
  11. P. C. v. O. S. A. V. Alfred J. Menezes, "Handbook of applied cryptography," http://cacr.uwaterloo.ca/hac/.
  12. K. R. a. R. G. K. Prasadh, "Public key cryptosystems based on chaotic Chebyshev polynomials," Journal of Engineering and Technology Research, vol. 1, no. 7, pp. 122-128, October, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing ElGamal cryptosystem lattice based cryptosystem chaotic cryptosystem.