scholarly journals Security Analysis and Performance Evaluation of a New Lightweight Cryptographic Algorithm for Cloud Computing Environment

Author(s):  
Fursan Thabit ◽  
Prof Sharaf Alhomdy ◽  
ProfDr Sudhir Jagtap
2013 ◽  
Vol 3 (1) ◽  
pp. 44-57 ◽  
Author(s):  
Veena Goswami ◽  
Choudhury Nishkanta Sahoo

Cloud computing has emerged as a new paradigm for accessing distributed computing resources such as infrastructure, hardware platform, and software applications on-demand over the internet as services. This paper presents an optimal resource management framework for multi-cloud computing environment. The authors model the behavior and performance of applications to integrate different service-providers for end-to-end-requirements. Each service model caters to specific type of requirements and there are already number of players with own customized products/services offered. Intercloud Federation and Service delegation models are part of Multi-Cloud environment where the broader target is to achieve infinite pool of resources. They propose an analytical queueing network model to improve the efficiency of the system. Numerical results indicate that the proposed provisioning technique detects changes in arrival pattern, resource demands that occur over time and allocates multiple virtualized IT resources accordingly to achieve application Quality of Service targets.


2018 ◽  
Vol 210 ◽  
pp. 04018
Author(s):  
Jarosław Koszela ◽  
Maciej Szymczyk

Today’s hardware has computing power allowing to conduct virtual simulation. However, even the most powerful machine may not be sufficient in case of using models characterized by high precision and resolution. Switching into constructive simulation causes the loss of details in the simulation. Nonetheless, it is possible to use the distributed virtual simulation in the cloud-computing environment. The aim of this paper is to propose a model that enables the scaling of the virtual simulation. The aspects on which the ability to disperse calculations depends were presented. A commercial SpatialOS solution was presented and performance tests were carried out. The use of distributed virtual simulation allows the use of more extensive and detailed simulation models using thin clients. In addition, the presented model of the simulation cloud can be the basis of the “Simulation-as-a-Service” cloud computing product.


Symmetry ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 150 ◽  
Author(s):  
Yicheng Yu ◽  
Liang Hu ◽  
Jianfeng Chu

The integration of Internet of things (IoT) and cloud computing technology has made our life more convenient in recent years. Cooperating with cloud computing, Internet of things can provide more efficient and practical services. People can accept IoT services via cloud servers anytime and anywhere in the IoT-based cloud computing environment. However, plenty of possible network attacks threaten the security of users and cloud servers. To implement effective access control and secure communication in the IoT-based cloud computing environment, identity authentication is essential. In 2016, He et al. put forward an anonymous authentication scheme, which is based on asymmetric cryptography. It is claimed that their scheme is capable of withstanding all kinds of known attacks and has good performance. However, their scheme has serious security weaknesses according to our cryptanalysis. The scheme is vulnerable to insider attack and DoS attack. For overcoming these weaknesses, we present an improved authentication and key agreement scheme for IoT-based cloud computing environment. The automated security verification (ProVerif), BAN-logic verification, and informal security analysis were performed. The results show that our proposed scheme is secure and can effectively resist all kinds of known attacks. Furthermore, compared with the original scheme in terms of security features and performance, our proposed scheme is feasible.


2015 ◽  
Vol 733 ◽  
pp. 779-783 ◽  
Author(s):  
Lu Dai ◽  
Jian Hua Li

Resource allocation is a key technology of cloud computing. At present, the most of studies on resource allocation mainly focus on improving the overall performance by balancing the load of data center. This paper will design the experimental platform of resource allocation algorithm, energy optimization and performance analysis, obtain original achievements in scientific research ,for the resource allocation method based on immune algorithm and energy optimization in cloud computing to provide innovative ideas and scientific basis. This research has important significance for further study on resource allocation and energy optimization in cloud computing environment.


Cloud ecosystem basically offers Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS). This paper describes the testing process employed for testing the C-DAC cloud SuMegha. Though new tools for the testing cloud are emerging into the market, there are aspects which are suited for manual testing and some which can be speeded up using automated testing tools. This paper brings out the techniques best suited to test different features of Cloud computing environment. It offers a comparison of several tools which enhance the testing process at each level. The authors also try to bring out (recommend) broad guidelines to follow while setting up a cloud environment to reduce the number of bugs in the system


2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


Sign in / Sign up

Export Citation Format

Share Document