28-01-2013, 02:26 PM
Modern Encryption Techniques for Cloud Computing
1Modern Encryption Techniques.pdf (Size: 1,022.93 KB / Downloads: 77)
Abstract
Cloud computing has to become the next-generation architecture of IT Enterprise. Clouds are massively complex systems. They can be reduced to simple primitives, that are replicated thousands of times, and common functional units. The complexity of cloud computing create many issues related to security as well as all aspects of Cloud computing. One of the most important issues is data security. Since Clouds typically have single security architecture but has many customers with different demands. The main focus of the proposed work is the data storage security in the cloud and the desktop. Generally, Data security is an important factor for both cloud computing and traditional desktop applications. This is to obtain the highest possible level of privacy. Modern Encryption algorithms play the main role in data security of cloud computing. We present an evaluation for selected eight modern encryption techniques namely: RC4, RC6, MARS, AES, DES, 3DES, Two-Fish, and Blow-Fish at two independent platforms namely; desktop computer and Amazon EC2 Micro Instance cloud computing environment.
INTRODUCTION
Cloud computing refers to the use of the networked infrastructure software and the capacity that provides resources to the on-demand environment. Information is stored in centralized servers and cached temporarily on clients that can include desktop computers, notebooks, handhelds, and other devices. The complexity of cloud can be reduced by simply reducing it into replicated thousands of primitives and common functional units.
CLOUD COMPUTING
This section gives an overview of cloud computing, Cloud Computing Architecture, and data security in cloud computing. There are many definitions that attempt to address cloud from the perspective of academicians, architects, engineers, developers, managers, and consumers [1]-[2]. The simplest definition of cloud computing is "moving computing from single desktop pc/data-centre to the internet".
Cloud computing is based on five attributes:
Multi-tenancy (shared resources): Cloud computing is based on a business model in which resources are
shared (i.e., multiple users use the same resource) at the network level, host level, and application level.
Massive scalability: Cloud computing provides the ability to scale to tens of thousands of systems, as well as the ability to massively scale bandwidth and storage space.
Elasticity: Users can rapidly increase and decrease their computing resources as needed.
Pay as you used: Users pay for only the resources they actually use and for only the time they require them.
Self-provisioning of resources: Users self-provision resources, such as additional systems (processing capability, software, storage) and network resources.
DISCRIBTION OF NIST STATISTICAL TESTS
The NIST Test Suite is a statistical package consisting of
15 tests that are developed to test the randomness of binary
sequences produced by either hardware or software. These tests
focus on a variety of different types of non-randomness that
could exist in a sequence. Some tests are decomposable into a
variety of subtests. The 15 tests are showing in Table 2.
This evaluation is performed according to NIST statistical
testing namely; Frequency The Frequency (Mon-obit) Test,
Frequency Test within a Block, The Runs Test, Tests for the
Longest-Run-of-Ones in a Block, The Binary Matrix Rank
Test, The Discrete Fourier Transform (Spectral) Test, The
Non-overlapping Template Matching Test, The Overlapping
Template Matching Test, Maurer's "Universal Statistical" Test,
The Linear Complexity Test, The Serial Test, The
Approximate Entropy Test, The Cumulative Sums (Cusums)
Test, The Random Excursions Test, and The Random
Excursions Variant Test [9]orderly from 1 to 16. The Block
Frequency, Non-overlapping Template Matching, Overlapping
Template Matching, Approximate Entropy, Serial, and Linear
Complexity tests require user prescribed input parameters. The
exact values used in these examples have been included in
parenthesis beside the name of the statistical test as shown in
Table 2. Each sample is 7,929,856 bits in length (991232 bytes
in length). Additionally, the P-values reported in the tables can
found in the results.txt files for each of the individual test – not
in the finalAnalysisReport.txt file in NIST package.
CONCLUSION
From simulation results, we can conclude that no strong indications of statistical weaknesses for eight modern encryption algorithms in both environments, but some differences between algorithms appeared. In Amazon EC2, the evaluation of eight modern encryption techniques show that RC6, AES, DES and Blowfish results were slightly better than other-encryption methods, Which the pervious methods have more than P-value in very safe area. Finally, AES encryption method is suitable algorithm for Amazon EC2 environment, but Blow-Fish and DES is more suitable when we focus on time of encryption method. On the selected encryption algorithms, sequence complexity values will exceed its threshold values for randomness only in Random Excursions Variant test and Random Excursions test. These two tests are not applicable, which there is insufficient number of cycles. In traditional desktop, the evaluation of eight modern encryption techniques show that RC6, AES, Blowfish, DES and RC4 results were slightly better than other-encryption methods which the pervious methods have more than P-value in very safe area. Finally, RC6 encryption method is suitable algorithm for traditional PC environment, but Blow-Fish is more suitable when we focus on time of encryption method.