Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack

Authors

  • M. F. Hyder Department of Software Engineering, NED University of Engineering & Technology, Pakistan
  • S. Tooba Department of Computer Science & Information Technology, NED University of Engineer and Technology, Pakistan
  • Waseemullah Department of Computer Science & Information Technology, NED University of Engineer and Technology, Pakistan
Volume: 11 | Issue: 4 | Pages: 7321-7325 | August 2021 | https://doi.org/10.48084/etasr.4220

Abstract

In this paper, the implementation of the General Secure Cloud Storage Protocol is carried out and instantiated by a multiplicatively Homomorphic Encryption Scheme (HES). The protocol provides a system for secure storage of data over the cloud, thereby allowing the client to carry out the operational tasks on it efficiently. The work focuses on the execution of five major modules of the protocol. We also evaluate the performance of the protocol with respect to the computation cost of these modules on the basis of different security parameters and datasets by conducting a series of experiments. The cloud was built using OpenStack and the data were outsourced from the client’s system to the cloud to study the security features and performance metrics when adopting the cloud environment.

Keywords:

OpenStack, RSA, cloud computing, homomorphic encryption, privacy

Downloads

Download data is not yet available.

References

M. A. Shahid, N. Islam, M. M. Alam, M. S. Mazliham, and S. Musa, "Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment," Computer Science Review, vol. 40, May 2021, Art. no. 100398. https://doi.org/10.1016/j.cosrev.2021.100398 DOI: https://doi.org/10.1016/j.cosrev.2021.100398

M. Ali, N. Q. Soomro, H. Ali, A. Awan, and M. Kirmani, "Distributed File Sharing and Retrieval Model for Cloud Virtual Environment," Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 4062-4065, Apr. 2019. https://doi.org/10.48084/etasr.2662 DOI: https://doi.org/10.48084/etasr.2662

M. Ramzan, M. S. Farooq, A. Zamir, W. Akhtar, M. Ilyas, and H. U. Khan, "An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3157-3161, Aug. 2018. https://doi.org/10.48084/etasr.2101 DOI: https://doi.org/10.48084/etasr.2101

S. Pearson, "Taking account of privacy when designing cloud computing services," in 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, May 2009, pp. 44-52. https://doi.org/10.1109/CLOUD.2009.5071532 DOI: https://doi.org/10.1109/CLOUD.2009.5071532

H. Tabrizchi and M. Kuchaki Rafsanjani, "A survey on security challenges in cloud computing: issues, threats, and solutions," The Journal of Supercomputing, vol. 76, no. 12, pp. 9493-9532, Dec. 2020. https://doi.org/10.1007/s11227-020-03213-1 DOI: https://doi.org/10.1007/s11227-020-03213-1

P. Sun, "Security and privacy protection in cloud computing: Discussions and challenges," Journal of Network and Computer Applications, vol. 160, Jun. 2020, Art. no. 102642. https://doi.org/10.1016/j.jnca.2020.102642 DOI: https://doi.org/10.1016/j.jnca.2020.102642

P. Yang, N. Xiong, and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access, vol. 8, pp. 131723-131740, 2020. https://doi.org/10.1109/ACCESS.2020.3009876 DOI: https://doi.org/10.1109/ACCESS.2020.3009876

A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, "A Survey on Homomorphic Encryption Schemes: Theory and Implementation," ACM Computing Surveys, vol. 51, no. 4, pp. 79:1-79:35, Jul. 2018. https://doi.org/10.1145/3214303 DOI: https://doi.org/10.1145/3214303

Y. Lu and M. Zhu, "Privacy preserving distributed optimization using homomorphic encryption," Automatica, vol. 96, pp. 314-325, Oct. 2018. https://doi.org/10.1016/j.automatica.2018.07.005 DOI: https://doi.org/10.1016/j.automatica.2018.07.005

A. Alabdulatif, I. Khalil, and X. Yi, "Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption," Journal of Parallel and Distributed Computing, vol. 137, pp. 192-204, Mar. 2020. https://doi.org/10.1016/j.jpdc.2019.10.008 DOI: https://doi.org/10.1016/j.jpdc.2019.10.008

M. Nassar, A. Erradi, and Q. M. Malluhi, "Paillier's encryption: Implementation and cloud applications," in 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beiriut, Lebanon, Oct. 2015. https://doi.org/10.1109/ARCSE.2015.7338149 DOI: https://doi.org/10.1109/ARCSE.2015.7338149

K. Hariss, H. Noura, and A. E. Samhat, "Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications," Journal of Information Security and Applications, vol. 34, pp. 233-242, Jun. 2017. https://doi.org/10.1016/j.jisa.2017.02.001 DOI: https://doi.org/10.1016/j.jisa.2017.02.001

Q. Wang, D. Zhou, and Y. Li, "Secure outsourced calculations with homomorphic encryption," Advanced Computing: An International Journal, vol. 9, no. 6, pp. 01-14, Nov. 2018. https://doi.org/10.5121/acij.2018.9601 DOI: https://doi.org/10.5121/acij.2018.9601

L. Jiang, Y. Cao, C. Yuan, X. Sun, and X. Zhu, "An effective comparison protocol over encrypted data in cloud computing," Journal of Information Security and Applications, vol. 48, Oct. 2019, Art. no. 102367. https://doi.org/10.1016/j.jisa.2019.102367 DOI: https://doi.org/10.1016/j.jisa.2019.102367

J. Zhang, Y. Yang, Y. Chen, J. Chen, and Q. Zhang, "A general framework to design secure cloud storage protocol using homomorphic encryption scheme," Computer Networks, vol. 129, pp. 37-50, Dec. 2017. https://doi.org/10.1016/j.comnet.2017.08.019 DOI: https://doi.org/10.1016/j.comnet.2017.08.019

R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On Data Banks and Privacy Homomorphisms," in Foundations of Secure Computation, Academia Press, 1978.

J. Buhler, P. L. Montgomery, R. Robson, and R. Ruby, Technical report implementing the number field sieve. Corvallis, OR, USA: Oregon State University, 1994.

O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," Journal of the ACM, vol. 33, no. 4, pp. 792-807, Aug. 1986. https://doi.org/10.1145/6490.6503 DOI: https://doi.org/10.1145/6490.6503

N. vurukonda and B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," Procedia Computer Science, vol. 92, pp. 128-135, Jan. 2016. https://doi.org/10.1016/j.procs.2016.07.335 DOI: https://doi.org/10.1016/j.procs.2016.07.335

A. J. Duncan, S. Creese, and M. Goldsmith, "Insider Attacks in Cloud Computing," in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, Jun. 2012, pp. 857-862. https://doi.org/10.1109/TrustCom.2012.188 DOI: https://doi.org/10.1109/TrustCom.2012.188

Md. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer Systems, vol. 28, no. 6, pp. 833-851, Jun. 2012. https://doi.org/10.1016/j.future.2012.01.006 DOI: https://doi.org/10.1016/j.future.2012.01.006

Downloads

How to Cite

[1]
M. F. Hyder, S. Tooba, and . Waseemullah, “Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 4, pp. 7321–7325, Aug. 2021.

Metrics

Abstract Views: 772
PDF Downloads: 574

Metrics Information