{"title":"云网络中密码系统安全评估的分析研究","authors":"Sattar B. Sadkan, F. Abdulraheem","doi":"10.1109/ICECCPCE.2013.6998753","DOIUrl":null,"url":null,"abstract":"Cloud networking describes a new model for IT services depending on Internet protocols. It contains provisioning of dynamically scalable usually and often virtualized resources. The cloud computing (Networking) Environments have many applicable cryptosystems, like symmetric (Stream Ciphers, Block ciphers - AES), and asymmetric cryptosystems (RSA, Knapsack, ECC) and others like Homomorphic, Identity Based Encryption, Biometric based cryptography. Simultaneously, there are many evaluation approaches existing for evaluation of any chosen crypto system used in cloud, but there is no unique evaluation method for these Cloud Crypto Systems. This paper provides analytical study to evaluate the performance of certain cryptographic systems used in cloud networking environments, these are Symmetric Searchable Encryption (SSE), Asymmetric Searchable Encryption (ASE), Elliptic Curve Crypto (ECC) system, AES algorithm, Homomorphic Encryption, and Identity Based Encryption. An evaluation table is constructed to display the effective parameters included in each cryptography system from which an evaluation equation is deduced to estimate the location of the system performance from reliable margin.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"An analytical study for security evaluation of cryptosystems used in cloud networking\",\"authors\":\"Sattar B. Sadkan, F. Abdulraheem\",\"doi\":\"10.1109/ICECCPCE.2013.6998753\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud networking describes a new model for IT services depending on Internet protocols. It contains provisioning of dynamically scalable usually and often virtualized resources. The cloud computing (Networking) Environments have many applicable cryptosystems, like symmetric (Stream Ciphers, Block ciphers - AES), and asymmetric cryptosystems (RSA, Knapsack, ECC) and others like Homomorphic, Identity Based Encryption, Biometric based cryptography. Simultaneously, there are many evaluation approaches existing for evaluation of any chosen crypto system used in cloud, but there is no unique evaluation method for these Cloud Crypto Systems. This paper provides analytical study to evaluate the performance of certain cryptographic systems used in cloud networking environments, these are Symmetric Searchable Encryption (SSE), Asymmetric Searchable Encryption (ASE), Elliptic Curve Crypto (ECC) system, AES algorithm, Homomorphic Encryption, and Identity Based Encryption. An evaluation table is constructed to display the effective parameters included in each cryptography system from which an evaluation equation is deduced to estimate the location of the system performance from reliable margin.\",\"PeriodicalId\":226378,\"journal\":{\"name\":\"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCPCE.2013.6998753\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCPCE.2013.6998753","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An analytical study for security evaluation of cryptosystems used in cloud networking
Cloud networking describes a new model for IT services depending on Internet protocols. It contains provisioning of dynamically scalable usually and often virtualized resources. The cloud computing (Networking) Environments have many applicable cryptosystems, like symmetric (Stream Ciphers, Block ciphers - AES), and asymmetric cryptosystems (RSA, Knapsack, ECC) and others like Homomorphic, Identity Based Encryption, Biometric based cryptography. Simultaneously, there are many evaluation approaches existing for evaluation of any chosen crypto system used in cloud, but there is no unique evaluation method for these Cloud Crypto Systems. This paper provides analytical study to evaluate the performance of certain cryptographic systems used in cloud networking environments, these are Symmetric Searchable Encryption (SSE), Asymmetric Searchable Encryption (ASE), Elliptic Curve Crypto (ECC) system, AES algorithm, Homomorphic Encryption, and Identity Based Encryption. An evaluation table is constructed to display the effective parameters included in each cryptography system from which an evaluation equation is deduced to estimate the location of the system performance from reliable margin.