Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack


  • M. F. Hyder Department of Software Engineering, NED University of Engineering & Technology, Pakistan
  • S. Tooba Department of Computer Science & Information Technology, NED University of Engineer and Technology, Pakistan
  • . Waseemullah Department of Computer Science & Information Technology, NED University of Engineer and Technology, Pakistan
Volume: 11 | Issue: 4 | Pages: 7321-7325 | August 2021 |


In this paper, the implementation of the General Secure Cloud Storage Protocol is carried out and instantiated by a multiplicatively Homomorphic Encryption Scheme (HES). The protocol provides a system for secure storage of data over the cloud, thereby allowing the client to carry out the operational tasks on it efficiently. The work focuses on the execution of five major modules of the protocol. We also evaluate the performance of the protocol with respect to the computation cost of these modules on the basis of different security parameters and datasets by conducting a series of experiments. The cloud was built using OpenStack and the data were outsourced from the client’s system to the cloud to study the security features and performance metrics when adopting the cloud environment.


OpenStack, RSA, cloud computing, homomorphic encryption, privacy


Download data is not yet available.


M. A. Shahid, N. Islam, M. M. Alam, M. S. Mazliham, and S. Musa, "Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment," Computer Science Review, vol. 40, May 2021, Art. no. 100398.

M. Ali, N. Q. Soomro, H. Ali, A. Awan, and M. Kirmani, "Distributed File Sharing and Retrieval Model for Cloud Virtual Environment," Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 4062–4065, Apr. 2019.

M. Ramzan, M. S. Farooq, A. Zamir, W. Akhtar, M. Ilyas, and H. U. Khan, "An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3157–3161, Aug. 2018.

S. Pearson, "Taking account of privacy when designing cloud computing services," in 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, May 2009, pp. 44–52.

H. Tabrizchi and M. Kuchaki Rafsanjani, "A survey on security challenges in cloud computing: issues, threats, and solutions," The Journal of Supercomputing, vol. 76, no. 12, pp. 9493–9532, Dec. 2020.

P. Sun, "Security and privacy protection in cloud computing: Discussions and challenges," Journal of Network and Computer Applications, vol. 160, Jun. 2020, Art. no. 102642.

P. Yang, N. Xiong, and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access, vol. 8, pp. 131723–131740, 2020.

A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, "A Survey on Homomorphic Encryption Schemes: Theory and Implementation," ACM Computing Surveys, vol. 51, no. 4, pp. 79:1-79:35, Jul. 2018.

Y. Lu and M. Zhu, "Privacy preserving distributed optimization using homomorphic encryption," Automatica, vol. 96, pp. 314–325, Oct. 2018.

A. Alabdulatif, I. Khalil, and X. Yi, "Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption," Journal of Parallel and Distributed Computing, vol. 137, pp. 192–204, Mar. 2020.

M. Nassar, A. Erradi, and Q. M. Malluhi, "Paillier’s encryption: Implementation and cloud applications," in 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beiriut, Lebanon, Oct. 2015.

K. Hariss, H. Noura, and A. E. Samhat, "Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications," Journal of Information Security and Applications, vol. 34, pp. 233–242, Jun. 2017.

Q. Wang, D. Zhou, and Y. Li, "Secure outsourced calculations with homomorphic encryption," Advanced Computing: An International Journal, vol. 9, no. 6, pp. 01–14, Nov. 2018.

L. Jiang, Y. Cao, C. Yuan, X. Sun, and X. Zhu, "An effective comparison protocol over encrypted data in cloud computing," Journal of Information Security and Applications, vol. 48, Oct. 2019, Art. no. 102367.

J. Zhang, Y. Yang, Y. Chen, J. Chen, and Q. Zhang, "A general framework to design secure cloud storage protocol using homomorphic encryption scheme," Computer Networks, vol. 129, pp. 37–50, Dec. 2017.

R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On Data Banks and Privacy Homomorphisms," in Foundations of Secure Computation, Academia Press, 1978.

J. Buhler, P. L. Montgomery, R. Robson, and R. Ruby, Technical report implementing the number field sieve. Corvallis, OR, USA: Oregon State University, 1994.

O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," Journal of the ACM, vol. 33, no. 4, pp. 792–807, Aug. 1986.

N. vurukonda and B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," Procedia Computer Science, vol. 92, pp. 128–135, Jan. 2016.

A. J. Duncan, S. Creese, and M. Goldsmith, "Insider Attacks in Cloud Computing," in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, Jun. 2012, pp. 857–862.

Md. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer Systems, vol. 28, no. 6, pp. 833–851, Jun. 2012.


How to Cite

M. F. Hyder, S. Tooba, and . Waseemullah, “Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 4, pp. 7321–7325, Aug. 2021.


Abstract Views: 137
PDF Downloads: 76

Metrics Information
Bookmark and Share

Most read articles by the same author(s)