Download and read the paper that presents the MIST Cloud Security algorithm, ‘Comparison of Securing Algorithms in Cloud Computing.’ Discuss how it can be applied in securing sensitive data and clo
READ THE PDF LINKED BELOW FIRST
Primary Task Response: Within the Discussion Board area, write 600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions with your classmates. Be substantive and clear, and use examples to reinforce your ideas.
For this Discussion Board, you will complete the following:
- Download and read the paper that presents the MIST Cloud Security algorithm, "Comparison of Securing Algorithms in Cloud Computing."
- Discuss how it can be applied in securing sensitive data and cloud-based IT resources.
- Evaluate and discuss the proposed algorithm as it relates to cloud disaster recovery and security algorithms.
978-1-5386-1887-5/17/$31.00 ©2017 IEEE
G. Murali Computer Science and Engineering
JNTUACEP, Pulivendula Andhra Pradesh, India [email protected]
R. Sivaram Prasad
Computer Science and Engineering Acharya Nagarjuna University, Guntur
Andhra Pradesh, India [email protected]
Abstract—Cloud computing, has become a variable solution on top of virtualization for commoditization of computing resources. The existing security models are built with certain assumptions. The quantum key distribution provides the security by a new scheme called as Quantum Key Distribution Protocol for Cloud Computing which offers the benefits of quantum mechanisms to provide the secure cloud storage and data dynamics. This paper provides comparative analysis performance in local and cloud environment to identify the best environment using classical or quantum cryptography on various cryptographic algorithms.
Keywords—Classical Cryptography; Quantum Cryptography
(QC); cloud;Cryptographic Algorithms
I. INTRODUCTION
A. Quantum Cryptography
A Novel and Quantum Cryptography is produced from combining quantum mechanics with cryptography. Modern cryptography which is widely used in computer networks relies on computational complexity. In other words, breaking of the quantum computer with the quantum algorithm gives the final to the end of modern cryptography. Quantum is classified into two divisions based on security schemes known as single photon and entangled photon. An entangled state of quantum corresponds to the state between two particles where the measurement result is based on 1 particle which affects the another particles state that are physically separated from the particles which are measured [1]. Quantum Cryptography will use the characteristics of the quantum mechanics like superposition, entanglement. By the use of those properties, some of the information is secretly shared among users by the quantum channel. The information is a key or the message. Quantum cryptography is involved in the Quantum Key Distribution (QKD) protocols to share key and provide the Quantum Direct Communication (QDC) protocols which are used to send a message.
B. Quantum Key Distribution Quantum Key Distribution (QKD) is one of the research where various protocols, scheme and the applications are used. QKD became more famous because it handles and tackles the main threats like impersonation and man-in-middle attack. In quantum cryptography authentication is the very hardest part because of its complexity level. Besides of this, key distribution problem is solved by quantum, it does not actually transfer any useful data. The cryptography strength is depending on the difficulty than that of an eavesdropper faces in breaking it. But Quantum Computing arrival, becomes easy to crack down any of the cryptosystem. Classical cryptography is no longer a secure communication method[2]. Securing data and data communication is a top priority because the consequences of unsecure data can have grave effects on both the economy and national security.
To provide security the Quantum cryptography always relies on the quantum mechanics laws where the traditional system to provide security in system depends on the computational difficulty of the encryption methods used.In this research by implementing Quantum Key Distribution (QKD) [3], to process in the authentication for the communication in a cloud infrastructure. The successful aim of the quantum key distribution protocols is to provide available parties, sender and receiver with randomly, correlatedly, and private classical data, to the key. There is a quantum channel to get into it, at their disposal, which is to be assumed that it is completely under the control of the adversary, Evesdropper. That means where the quantum state sender or receiver send by the channel, the outcome is completely arbitrary, the main problem is consistent with the quantum mechanics. In the additional of the quantum channel, the other parties will make utilize of public channel and the classical channel, assumed for authentication, by means, it cannot be alter or forge messages [4].
Comparison of Cryptographic Algorithms in Cloud and Local Environment using Quantum Cryptography
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
3749
Authorized licensed use limited to: Perdoceo Education Corporation. Downloaded on August 14,2022 at 02:16:42 UTC from IEEE Xplore. Restrictions apply.
C. Cloud Quantum computing where Cloud is based, is the invocation of quantum simulators, emulators, or processors through the cloud. Quantum processing is accessed for the cloud servers. Cloud allows the accessed data is more easier than the users to process the data and store the data securely in own cloud or any third party server with various capabilities.
D. Cloud Security The main threat in cloud computing is loss of data and leakage of information to the unauthorized person i.e., third party. Cloud computing is the merging of different computing entities, which are globally separated, but are connected electronically. Now a days geography of computation is facing towards the corporate servers, which brings a lot of issues in the security, like virtualization security, distributed computing, application security, identity management, access control and authentication [5]. The strong authentication of user is mostly useful for cloud computing to ensure that only user who have access can access to the server.
II. PROPOSED SYSTEM
In this paper 3DES, DES, AES, and Blowfish algorithms comparison is conducted on the performance by using several various settings for processing different data filesizes i.e., from 100KB to 600KB to provide the algorithm’s encryption/decryption time, throughput, and Avalanche effect of the one of the bit changes in the key and plain text in Cloud and Local environment, based on different performance metrics. Analysis is performed in local and cloud environment to identify the best environment using classical or quantum cryptography on various cryptographic algorithms by running different data file sizes using same metrics .
III. METHODOLOGY
A. Simulation and Settings The simulation of the performance of DES, AES and Blowfish is done. For DES, AES and Blowfish available in java cryptography and java security, the implemention is performed. Based on the Cipher class which provides the main function of a cryptographic cipher which is used for encryption process and decryption process. Block ciphers are used to evaluate the results. Hence, the loaded data i.e., plaintext is divided into smaller block size.
B. System Parameters The experiments are conducted using parameters like Performance and the Avalanche Effect. In the performance throughput of all the algorithms is calculated. In Avalanche Effect plain text change and key change are calculated. These
experiments are performed so many times to measure the performance and avalanche effect.
C. Experiment Factors Security features of each of the algorithm provides the
strength against the cryptographic attacks. The factors determines the performance of the algorithm's and Avalanche effect based on encryption/decryption data blocks of various sizes.
IV. RESULTS AND ANALYSIS
A. Quantum Results with cloud Environment
This section presents the results of various cryptographic algorithms integrated with BB84 protocol of Quantum Cryptography by considering the performance of metrics includes Encryption and Decryption time and Throughput when deployed in the cloud server.
(1) Performance
Table I. shows the computational time of various cryptographic algorithms with different file sizes varied from 100kb to 600kb integrated with BB84 protocol when deployed on cloud server. From fig. 1. it presents that TDES has better performance on Encryption and Decryption time when deployed on cloud compared to various cryptographic algorithms with very low computational time.
TABLE I. ENCRYPTION AND DECRYPTION WITH DIFFERENT FILE SIZES
100 200 300 400 500 600
DES 72 251 598 1927 2958 5997
TDES 71 253 584 1657 2405 4517
AES 70 281 615 1653 2815 4624
Blowfish 81 285 619 1702 2468 4839
Fig. 1. Encryption & Decryption time with different file size
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
3750
Authorized licensed use limited to: Perdoceo Education Corporation. Downloaded on August 14,2022 at 02:16:42 UTC from IEEE Xplore. Restrictions apply.
Table II. shows the computational throughput of various cryptographic algorithms with different file sizes varied from 100kb to 600kb integrated with BB84 protocol when deployed on cloud server. From fig. 2. it presents that TDES has better performance on throughput when deployed on cloud compared to various cryptographic algorithms with rate of 32.9 on average.
TABLE II. THROUGHPUT WITH DIFFERENT FILE SIZES
Fig. 2. Throughput with different file sizes
B. Quantum Results with Local Environment vs. Cloud Environment
This section represents the comparative analysis of various cryptographic algorithms integrated with BB84 protocol of Quantum Cryptography when deployed in both local and cloud environments.
(1) Performance
Table III. shows the computational analysis of Encryption and decryption time of various cryptographic algorithms integrated with BB84 protocol of Quantum Cryptography deployed on both local and cloud environment. From Fig. 3.
the simulation results of cryptographic algorithms in cloud environment has better performance when compared with simulation results in the local environment.
TABLE III. ENCRYPTION & DECRYPTION WITH DIFFERENT FILE SIZES
Fig. 3. Encryption & Decryption time with different file sizes
Table IV. shows the computational analysis of throughput of various cryptographic algorithms integrated with BB84 protocol of Quantum Cryptography deployed on both local and cloud environment. From Fig. 4. the simulation results of cryptographic algorithms in cloud environment has better performance with throughput rate when compared with simulation results in the local environment.
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
3751
Authorized licensed use limited to: Perdoceo Education Corporation. Downloaded on August 14,2022 at 02:16:42 UTC from IEEE Xplore. Restrictions apply.
TABLE IV. THROUGHPUT WITH DIFFERENT FILE SIZES
Fig. 4. Throughput with different file sizes
V. CONCLUSION This paper illustrates the comparative analysis of various
cryptographic techniques of Quantum Cryptography has performed to estimate the best environment among local and cloud environment. By this it is observation that cloud environment gives better performance and throughput compared to local environment.
REFERENCES
[2] Aakash Goyal, Sapna Aggarwal and Aanchal Jain, “Quantum Cryptography & its Comparison with Classical Cryptography: A Review Paper”, IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011] ISBN 81-87885-03-3.
[3] Ms. V. Padmavathi, Dr. B. Vishnu Vardhan, Dr. A. V. N. Krishna,” Quantum Cryptography and Quantum Key Distribution Protocols: A Survey”, 2016 IEEE 6th International Conference on Advanced Computing.
[4] Minal Lopes, Dr. Nisha Sarwade, “Simulation and Modeling approach for Performance Analysis of Practical Quantum Key Distribution” ,IEEE INDICON 2015.
[5] Zuriati Ahmad Zukarnain, and Roszelinda Khalid,” Quantum Key Distribution Approach for Cloud Authentication: Enhance Tight Finite Key”, International conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18 .
[1] Miss. Payal P. Kilor, Mr.Pravin.D.Soni,Wiedemann,”Quantum Cryptography: Realizing next generation”, International Journal of Application or Innovation in Engineering & Management, Volume 3, Issue 2, February 2014.
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
3752
Authorized licensed use limited to: Perdoceo Education Corporation. Downloaded on August 14,2022 at 02:16:42 UTC from IEEE Xplore. Restrictions apply.
<< /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles false /AutoRotatePages /None /Binding /Left /CalGrayProfile (Gray Gamma 2.2) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated 50SWOP51 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Warning /CompatibilityLevel 1.4 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.0000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize false /OPM 0 /ParseDSCComments false /ParseDSCCommentsForDocInfo false /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo false /PreserveFlatness true /PreserveHalftoneInfo true /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts false /TransferFunctionInfo /Remove /UCRandBGInfo /Preserve /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true /Arial-Black /Arial-BoldItalicMT /Arial-BoldMT /Arial-ItalicMT /ArialMT /ArialNarrow /ArialNarrow-Bold /ArialNarrow-BoldItalic /ArialNarrow-Italic /ArialUnicodeMS /BookAntiqua /BookAntiqua-Bold /BookAntiqua-BoldItalic /BookAntiqua-Italic /BookmanOldStyle /BookmanOldStyle-Bold /BookmanOldStyle-BoldItalic /BookmanOldStyle-Italic /BookshelfSymbolSeven /Century /CenturyGothic /CenturyGothic-Bold /CenturyGothic-BoldItalic /CenturyGothic-Italic /CenturySchoolbook /CenturySchoolbook-Bold /CenturySchoolbook-BoldItalic /CenturySchoolbook-Italic /ComicSansMS /ComicSansMS-Bold /CourierNewPS-BoldItalicMT /CourierNewPS-BoldMT /CourierNewPS-ItalicMT /CourierNewPSMT /EstrangeloEdessa /FranklinGothic-Medium /FranklinGothic-MediumItalic /Garamond /Garamond-Bold /Garamond-Italic /Gautami /Georgia /Georgia-Bold /Georgia-BoldItalic /Georgia-Italic /Haettenschweiler /Impact /Kartika /Latha /LetterGothicMT /LetterGothicMT-Bold /LetterGothicMT-BoldOblique /LetterGothicMT-Oblique /LucidaConsole /LucidaSans /LucidaSans-Demi /LucidaSans-DemiItalic /LucidaSans-Italic /LucidaSansUnicode /Mangal-Regular /MicrosoftSansSerif /MonotypeCorsiva /MSReferenceSansSerif /MSReferenceSpecialty /MVBoli /PalatinoLinotype-Bold /PalatinoLinotype-BoldItalic /PalatinoLinotype-Italic /PalatinoLinotype-Roman /Raavi /Shruti /Sylfaen /SymbolMT /Tahoma /Tahoma-Bold /TimesNewRomanMT-ExtraBold /TimesNewRomanPS-BoldItalicMT /TimesNewRomanPS-BoldMT /TimesNewRomanPS-ItalicMT /TimesNewRomanPSMT /Trebuchet-BoldItalic /TrebuchetMS /TrebuchetMS-Bold /TrebuchetMS-Italic /Tunga-Regular /Verdana /Verdana-Bold /Verdana-BoldItalic /Verdana-Italic /Vrinda /Webdings /Wingdings2 /Wingdings3 /Wingdings-Regular /ZWAdobeF ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 200 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages false /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /ColorImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 200 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages false /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /GrayImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 400 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 600 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName () /PDFXTrapped /False /CreateJDFFile false /Description << /CHS <FEFF4f7f75288fd94e9b8bbe5b9a521b5efa7684002000410064006f006200650020005000440046002065876863900275284e8e55464e1a65876863768467e5770b548c62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002> /CHT <FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef69069752865bc666e901a554652d965874ef6768467e5770b548c52175370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002> /DAN <FEFF004200720075006700200069006e0064007300740069006c006c0069006e006700650072006e0065002000740069006c0020006100740020006f007000720065007400740065002000410064006f006200650020005000440046002d0064006f006b0075006d0065006e007400650072002c0020006400650072002000650067006e006500720020007300690067002000740069006c00200064006500740061006c006a006500720065007400200073006b00e60072006d007600690073006e0069006e00670020006f00670020007500640073006b007200690076006e0069006e006700200061006600200066006f0072007200650074006e0069006e006700730064006f006b0075006d0065006e007400650072002e0020004400650020006f007000720065007400740065006400650020005000440046002d0064006f006b0075006d0065006e0074006500720020006b0061006e002000e50062006e00650073002000690020004100630072006f00620061007400200065006c006c006500720020004100630072006f006200610074002000520065006100640065007200200035002e00300020006f00670020006e0079006500720065002e> /DEU <FEFF00560065007200770065006e00640065006e0020005300690065002000640069006500730065002000450069006e007300740065006c006c0075006e00670065006e0020007a0075006d002000450072007300740065006c006c0065006e00200076006f006e002000410064006f006200650020005000440046002d0044006f006b0075006d0065006e00740065006e002c00200075006d002000650069006e00650020007a0075007600650072006c00e40073007300690067006500200041006e007a006500690067006500200075006e00640020004100750073006700610062006500200076006f006e00200047006500730063006800e40066007400730064006f006b0075006d0065006e00740065006e0020007a0075002000650072007a00690065006c0065006e002e00200044006900650020005000440046002d0044006f006b0075006d0065006e007400650020006b00f6006e006e0065006e0020006d006900740020004100630072006f00620061007400200075006e0064002000520065006100640065007200200035002e003000200075006e00640020006800f600680065007200200067006500f600660066006e00650074002000770065007200640065006e002e> /ESP <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> /FRA <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> /ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF adatti per visualizzare e stampare documenti aziendali in modo affidabile. I documenti PDF creati possono essere aperti con Acrobat e Adobe Reader 5.0 e versioni successive.) /JPN <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> /KOR <FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020be44c988b2c8c2a40020bb38c11cb97c0020c548c815c801c73cb85c0020bcf4ace00020c778c1c4d558b2940020b3700020ac00c7a50020c801d569d55c002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200035002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e> /NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken waarmee zakelijke documenten betrouwbaar kunnen worden weergegeven en afgedrukt. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.) /NOR <FEFF004200720075006b00200064006900730073006500200069006e006e007300740069006c006c0069006e00670065006e0065002000740069006c002000e50020006f0070007000720065007400740065002000410064006f006200650020005000440046002d0064006f006b0075006d0065006e00740065007200200073006f006d002000650072002000650067006e0065007400200066006f00720020007000e5006c006900740065006c006900670020007600690073006e0069006e00670020006f00670020007500740073006b007200690066007400200061007600200066006f0072007200650074006e0069006e006700730064006f006b0075006d0065006e007400650072002e0020005000440046002d0064006f006b0075006d0065006e00740065006e00650020006b0061006e002000e50070006e00650073002000690020004100630072006f00620061007400200065006c006c00650072002000410064006f00620065002000520065006100640065007200200035002e003000200065006c006c00650072002e> /PTB <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> /SUO <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> /SVE <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> /ENU (Use these settings to create PDFs that match the "Required" settings for PDF Specification 4.01) >> >> setdistillerparams << /HWResolution [600 600] /PageSize [612.000 792.000] >> setpagedevice
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.