Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack
Received: 5 May 2021 | Revised: 24 May 2021 and 29 May 2021 | Accepted: 2 June 2021 | Online: 21 August 2021
Corresponding author: M. F. Hyder
In this paper, the implementation of the General Secure Cloud Storage Protocol is carried out and instantiated by a multiplicatively Homomorphic Encryption Scheme (HES). The protocol provides a system for secure storage of data over the cloud, thereby allowing the client to carry out the operational tasks on it efficiently. The work focuses on the execution of five major modules of the protocol. We also evaluate the performance of the protocol with respect to the computation cost of these modules on the basis of different security parameters and datasets by conducting a series of experiments. The cloud was built using OpenStack and the data were outsourced from the client’s system to the cloud to study the security features and performance metrics when adopting the cloud environment.
Keywords:OpenStack, RSA, cloud computing, homomorphic encryption, privacy
M. A. Shahid, N. Islam, M. M. Alam, M. S. Mazliham, and S. Musa, "Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment," Computer Science Review, vol. 40, May 2021, Art. no. 100398. https://doi.org/10.1016/j.cosrev.2021.100398
M. Ali, N. Q. Soomro, H. Ali, A. Awan, and M. Kirmani, "Distributed File Sharing and Retrieval Model for Cloud Virtual Environment," Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 4062-4065, Apr. 2019. https://doi.org/10.48084/etasr.2662
M. Ramzan, M. S. Farooq, A. Zamir, W. Akhtar, M. Ilyas, and H. U. Khan, "An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3157-3161, Aug. 2018. https://doi.org/10.48084/etasr.2101
S. Pearson, "Taking account of privacy when designing cloud computing services," in 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, May 2009, pp. 44-52. https://doi.org/10.1109/CLOUD.2009.5071532
H. Tabrizchi and M. Kuchaki Rafsanjani, "A survey on security challenges in cloud computing: issues, threats, and solutions," The Journal of Supercomputing, vol. 76, no. 12, pp. 9493-9532, Dec. 2020. https://doi.org/10.1007/s11227-020-03213-1
P. Sun, "Security and privacy protection in cloud computing: Discussions and challenges," Journal of Network and Computer Applications, vol. 160, Jun. 2020, Art. no. 102642. https://doi.org/10.1016/j.jnca.2020.102642
P. Yang, N. Xiong, and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access, vol. 8, pp. 131723-131740, 2020. https://doi.org/10.1109/ACCESS.2020.3009876
A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, "A Survey on Homomorphic Encryption Schemes: Theory and Implementation," ACM Computing Surveys, vol. 51, no. 4, pp. 79:1-79:35, Jul. 2018. https://doi.org/10.1145/3214303
Y. Lu and M. Zhu, "Privacy preserving distributed optimization using homomorphic encryption," Automatica, vol. 96, pp. 314-325, Oct. 2018. https://doi.org/10.1016/j.automatica.2018.07.005
A. Alabdulatif, I. Khalil, and X. Yi, "Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption," Journal of Parallel and Distributed Computing, vol. 137, pp. 192-204, Mar. 2020. https://doi.org/10.1016/j.jpdc.2019.10.008
M. Nassar, A. Erradi, and Q. M. Malluhi, "Paillier's encryption: Implementation and cloud applications," in 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beiriut, Lebanon, Oct. 2015. https://doi.org/10.1109/ARCSE.2015.7338149
K. Hariss, H. Noura, and A. E. Samhat, "Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications," Journal of Information Security and Applications, vol. 34, pp. 233-242, Jun. 2017. https://doi.org/10.1016/j.jisa.2017.02.001
Q. Wang, D. Zhou, and Y. Li, "Secure outsourced calculations with homomorphic encryption," Advanced Computing: An International Journal, vol. 9, no. 6, pp. 01-14, Nov. 2018. https://doi.org/10.5121/acij.2018.9601
L. Jiang, Y. Cao, C. Yuan, X. Sun, and X. Zhu, "An effective comparison protocol over encrypted data in cloud computing," Journal of Information Security and Applications, vol. 48, Oct. 2019, Art. no. 102367. https://doi.org/10.1016/j.jisa.2019.102367
J. Zhang, Y. Yang, Y. Chen, J. Chen, and Q. Zhang, "A general framework to design secure cloud storage protocol using homomorphic encryption scheme," Computer Networks, vol. 129, pp. 37-50, Dec. 2017. https://doi.org/10.1016/j.comnet.2017.08.019
R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On Data Banks and Privacy Homomorphisms," in Foundations of Secure Computation, Academia Press, 1978.
J. Buhler, P. L. Montgomery, R. Robson, and R. Ruby, Technical report implementing the number field sieve. Corvallis, OR, USA: Oregon State University, 1994.
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," Journal of the ACM, vol. 33, no. 4, pp. 792-807, Aug. 1986. https://doi.org/10.1145/6490.6503
N. vurukonda and B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," Procedia Computer Science, vol. 92, pp. 128-135, Jan. 2016. https://doi.org/10.1016/j.procs.2016.07.335
A. J. Duncan, S. Creese, and M. Goldsmith, "Insider Attacks in Cloud Computing," in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, Jun. 2012, pp. 857-862. https://doi.org/10.1109/TrustCom.2012.188
Md. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer Systems, vol. 28, no. 6, pp. 833-851, Jun. 2012. https://doi.org/10.1016/j.future.2012.01.006
How to Cite
MetricsAbstract Views: 403
PDF Downloads: 260
Copyright (c) 2021 Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.