Thursday, October 18, 2018

Cloud Computing


Introduction
            Cloud computing is a type of computing based on the Internet. Cloud computing is also a utility model where organizations regardless of the size host their data centers, processes, and applications using the Internet. In the past, people used to run computer applications from the software downloaded on a physical computer or the organizational server housed in a building. However, cloud computing in the modern days allows people to have a timely access to similar applications through the Internet.
            The chances are that people are relying on cloud computing and its applications to solving the problems faced by small businesses whether the user is firing emails off or using several applications to help in the management of the workload. In short, cloud computing is slowly becoming the new way of doing things and the new formal. Historically, cloud computing has become the catalyst for a rapid shift in the world of business. It has created new business models thus accelerating innovation and changing the economic processes of many industries.
Description of Algorithms
            Secure communication would not be provided over the cloud computing network without encryption algorithms. Therefore, security algorithms play a vital role. Also, security algorithms are fundamental in the ways in which data is protected. Encryption algorithms help in the conversion of the data in a scrambled form using “the key” where the user also has the key to decrypt the transmitted data. There are two techniques of encryption which are Symmetric and Asymmetric key encryption. In Symmetric key encryption, there is only one key for both encryption and decryption. In Asymmetric key, there is a public and private key for encryption and decryption respectively (Jian et al., 2016). 
Figure 1: Cloud Computing Security Algorithms
Symmetric Algorithms
·         Data Encryption Standards (DES): The algorithm was developed around 1977, and it was the first recommendation of NIST. The algorithm is 64 bits key size and has a 64 bits block size. Since its development, there have been many attacks and methods to weaken DES thus becoming an insecure block cipher. Below is its algorithm (Tingyuan, Lijian, & Zhe-Ming, 2014):

·         Blowfish: The algorithm was developed as late as 1993. It is also one of the common public algorithms developed and provided by Bruce Schneier. It is also a variable length key having a 64-bit block cipher. There have not been any strong attacks on the algorithm. Its superiority over other algorithms has been proved the different experiments and research it has been exposed to. It also has a better throughput and power consumption than other algorithms.
·         RC5: The algorithm is a development of 1994 with a block size of 32, 64, or 128 if it is an MAX2040 bit. The different use of the algorithm is an indication that it is secure. However, it has a slow speed.
·         3DES: The algorithm was developed in 1998 as an improvement of DES. It has a similar encryption method to the original DES. However, it is applied at least three times to increase the level of encryption. Additionally, it is known to be slower than other methods of block ciphers. It is a 64-bit block size with 192 bits key size. It has a lower performance with regards to power consumption and throughput in comparison with
·         DES. It also requires more time than the DES because it has a characteristic of triple phase encryption.
·         Advanced Encryption Standard (AES): It is the newly developed encryption standard which is also recommended by NIST as a replacement of DES. Brute force attack is the only known method of attack to have passed it. Both AES and DES are similar in that they are block ciphers. Its variable key length is of 128, 192, or 256 bits but its default is 256 bits. It has the capability of encrypting data blocks of 128 bits into 10, 12, and 14 rounds based on the size of the key. It is advantageous in that it is fast and flexible. It can also be implemented on different platforms especially in small devices. It has also been tested carefully for various security applications. 
Asymmetric Algorithms
·         RSA: This is a type of Internet encryption and a system of authentication. It uses an algorithm developed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977. The RSA algorithm is the most recommended and commonly used algorithm in cloud computing. There is no any other known algorithm for private and public key generation and encryption. It is advantageous in that it is fast (Mirzayi & Rafe, 2015).
RSA is also known to have a multiplicative homomorphic property. This means that a user can easily find the product of the plain text by multiplication of the cipher texts. The product of this operation is the cipher text of that particular product as represented below:
·         Digital Signature Algorithm (DSA): The algorithm is one of the Federal Information Processing Standards for digital standards. It was also a proposal of National Institute of Standards and Technology (NIST) in 1991 to be specifically used in their Digital Signature Standard (DSS). It went on to be adopted as an FIPS 186 in 1993. With this algorithm, the entropy, uniqueness, and secrecy of the random signature value k is essential. Violation of any of the above three requirements can reveal to the attacker the entire private key. DSA can easily be broken by using a value that can easily be predicted or omitting a few bits of k in each of the different signatures.
·         Diffie-Hellman Key Exchange (D-H): Diffie-Hellman key exchange is a particular method used for exchanging cryptographic keys. It is also one of the earliest applied practical examples of key exchange implemented in the field of cryptography. The algorithm method allows any two parties that do not know each other to establish a shared secret key through an insecure communication channel jointly. The key is then used in the encryption of the subsequent communications by use of a symmetric key cipher (Taft, 2013).
·         El Gamal: In the world of cryptography, this method and system of encryption is an asymmetric key encryption algorithm used in the public key cryptography. The method is also based on the Diffie-Hellman key exchange algorithm. It originated from the description by Taher El Gamal in 1984. The method is commonly used in GNU Privacy Guard software as well as recent versions of PGP among other cryptosystems. The Digital Signature Algorithm is also a variant of the El Gamal encryption system and should therefore, not be confused with the El Gamal encryption system. El Gamal encryption system can be defined through any cyclic group. Additionally, its security depends on the difficulty of a particular problem in relation to the computing discrete logarithms (Guiyi, Rongxing, & Jun, 2014).

Comparison and Analysis of Algorithms
            In this comparison, the paper shall compare the existing and the most common algorithms on the basis on different parameters. The parameters on which the comparison will be based are block size, key length, speed, and security as shown in the table below.
Features
DES
Blowfish
RC5
3-DES
AES
Year of development
1977
1993
1994
1998
2000
Size of the block
64
64
32, 64, or 128
64
128, 192, or 256
Security of the algorithm
It has been proven to be inadequate
It is considered secure
It is considered secure
It is considered secure
It is considered secure
Length of the key
56
32 - 448
MAX2040
112 or 168
128, 192, or 256
Execution Speed
Very slow speed
Fast
Slow
Slow
Very fast speed
Table 1: Comparison of different algorithms according to various parameters
Conclusion
            Cloud computing is changing the technological way of doing things. Businesses now have various paths to cloud computing including platforms, applications, and infrastructure that are readily available from cloud computing providers as online services. Many cloud users may be confused by the existence of offerings and the terminology for describing them and therefore, they will not be sure of the risk and benefits. Security is a primary requirement in cloud computing while we deal with data storage. There are various techniques that cloud computing users can use in implementing security in the cloud. This paper discussed different symmetric and asymmetric algorithms. The future of cloud computing should consider some problems about the security algorithms and go on to implement better algorithm versions of DES, RSA, 3DES, AES, IDES, and Blowfish.

References
Guiyi, W., Rongxing, L., & Jun, S. (2014). EFADS: Efficient, flexible and anonymous data        
            sharing protocol for cloud computing with proxy re-encryption. Journal of Computer &    
            System Sciences, 80(8), 1549-1562. doi:10.1016/j.jcss.2014.04.021
Jian, L., Huimei, W., Ming, X., Hong, R., & Kun, H. (2016). Reliable and confidential cloud       
            storage with efficient data forwarding functionality. IET Communications, 10(6), 661-     
            668. doi:10.1049/iet-com.2015.0608
Mirzayi, S., & Rafe, V. (2015). A hybrid heuristic workflow scheduling algorithm for cloud        
            computing environments. Journal Of Experimental & Theoretical Artificial Intelligence,    
            27(6), 721-735. doi:10.1080/0952813X.2015.1020524
Taft, D. K. (2013). IBM Patents Cryptography Invention to Advance Security in the Cloud.        
            Eweek, 6.
Tingyuan, N., Lijian, Z., & Zhe-Ming, L. (2014). Power evaluation methods for data encryption  
            algorithms. IET Software, 8(1), 12-18. doi:10.1049/iet-sen.2012.0137


Sherry Roberts is the author of this paper. A senior editor at Melda Research in legitimate research paper writing services if you need a similar paper you can place your order for buy narrative essay.

No comments:

Post a Comment

Buy thesis Online for Cheap

We are keen on ensuring that, any time students Buy thesis Online papers from our website, they get good grades that align with their expec...