Performance Analysis of a Hybrid Security Algorithm for Secure Cloud Environment

Main Article Content

John Mulopwe Lukusa
Fatma Tansu Hocanın

Abstract

Encryption algorithms are critical in ensuring the security of information in today's rapidly evolving internet and network applications. These algorithms are especially important in ensuring information security for internet-based dynamic applications and storage methods like cloud computing, which require high reliability, scalability, and autonomy to enable ubiquitous access. Given the prevalence of cloud computing in our everyday routines, data security has emerged as a major concern, particularly for non-technical users. To address this concern, the effectiveness of two widely used symmetric key encryption algorithms, AES and Blowfish, in terms of throughput, power consumption, and encryption speed, has been analyzed and compared. Based on the simulation results, it is clear that AES outperforms Blowfish when security flaws are put into consideration. It should be noted, however, that AES requires more processing power. As a result, a proposed efficient hybrid security algorithm seeks to combine the benefits of both approaches in an encryption system, thereby improving data security in a cloud environment while optimizing resource utilization. According to the performance analysis, the proposed hybrid approach is an excellent solution for encrypting and decrypting files with large block sizes and longer keys, as well as defending against Man in the Middle (MitM) attacks.


Article Details

How to Cite
Lukusa, J. M., & Hocanın, F. T. (2023). Performance Analysis of a Hybrid Security Algorithm for Secure Cloud Environment. Technium: Romanian Journal of Applied Sciences and Technology, 11, 72–86. https://doi.org/10.47577/technium.v11i.9127
Section
Articles

References

James, D., & Girish Tere.: Cloud-Computing. The University of Mumbai, (2018).

Keijo, H., Adnan, A., Johan, L., & Tommi, M.: Introduction to Cloud Computing Technologies. TUCS General Publication (2014). https://doi.org/10.13140/2.1.1747.8082

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., & Zaharia, M.: A view of cloud computing. Communications of the ACM, 53(4), 50-58 (2010).

Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B.: An analysis of security issues for cloud computing. Journal of internet services and Applications, 4, 1-13 (2013).

Zhang, Q., Cheng, L., & Boutaba, R.: Cloud computing: state-of-the-art and research challenges. Journal of internet services and Applications, 1, 7-18 (2010).

Mell, P., & Grance, T.: The NIST definition of cloud computing (2011).

Malik, A., Hiekkanen, K., Dhir, A., & Nieminen, M.: Impact of privacy, trust and user activity on intentions to share Facebook photos. Journal of Information, Communication and Ethics in Society (2016).

Dowling, J.: Introduction to Cloud Computing (2019).

Gandhi, P.: Data visualization techniques: Traditional data to big data. In Data Visualization: Trends and Challenges Toward Multidisciplinary Perception (pp. 53–74). Springer Singapore (2020). https://doi.org/10.1007/978-981-15-2282-6_4

Purwinarko, A., & Hardyanto, W.: A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications. Scientific Journal of Informatics, 5(1), 2407–7658 (2018a). http://journal.unnes.ac.id/nju/index.php/sji

Abirami, M., & Chellaganeshavalli, S.: Performance Analysis of AES and Blowfish Encryption Algorithm. In International Journal of Innovative Research in Science, Engineering and Technology, An ISO, Vol. 3297, Issue 11 (2007). www.ijirset.com

Sampath, D. M., Ch, U. K., & T, P.: Generating Cipher Text using BLOWFISH Algorithm for Secured Data Communications. International Journal of Innovative Technology and Exploring Engineering, 9(2), 117–121 (2019). https://doi.org/10.35940/ijitee.a5063.129219

Sicari, S., Rizzardi, A., & Coen-Porisini, A.: 5G In the Internet of things era: An overview on security and privacy challenges. Computer Networks, 179, 107345 (2020).

Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M.: A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA, and Blowfish. Procedia Computer Science, 78, 617–624 (2016). https://doi.org/10.1016/j.procs.2016.02.108

Qadir, A. M., & Varol, N.: A review paper on cryptography. 7th International Symposium on Digital Forensics and Security, ISDFS 2019, October, 1–6 (2019). https://doi.org/10.1109/ISDFS.2019.8757514

Gupta, A., & Walia, N. K.: Cryptography Algorithms : A Review. International Journal of Engineering Development and Research, 2(2), 1667–1672 (2014). http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=FEF3E8340DC536679E3C83BF43F1616C?doi=10.1.1.674.7141&rep=rep1&type=pdf last accessed 2023/06/06

Ivan, P., Tommi, M., & Adnan, A.: Introduction to Cloud Computing Technologies. ACM Papers (2013). https://doi.org/10.13140/2.1.1747.8082

Tawalbeh, L. A., Haddad, Y., Khamis, O., Benkhelifa, E., Jararweh, Y., & AlDosari, F.: Efficient and secure software-defined mobile cloud computing infrastructure. International Journal of High-Performance Computing and Networking, 9(4), 328-341 (2016).

Purwinarko, A., & Hardyanto, W.: A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications. Scientific Journal of Informatics, 5(1), 2407–7658 (2018b). http://journal.unnes.ac.id/nju/index.php/sji

Masud, M., & Huang, X.: An e-learning system architecture based on cloud computing. World Academy of Science, Engineering, and Technology, 62, 74-78 (2012).

Masud, M. A. H., & Huang, X.: A novel approach for adopting cloud-based e-learning system. In 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, pp. 37-42, IEEE (2012).

Ghosh, A. M., & Grolinger, K.: Edge-cloud computing for Internet of Things data analytics: Embedding intelligence in the edge with deep learning. IEEE Transactions on Industrial Informatics, 17(3), 2191-2200 (2020).

Ul Haq, M. N., & Kumar, N.: A novel data classification-based scheme for cloud data security using various cryptographic algorithms. International Review of Applied Sciences and Engineering, September (2021). https://doi.org/10.1556/1848.2021.00317

Mahmud, A. H., Angga, B. W., Tommy, Marwan, A. E., & Siregar, R.: Performance analysis of AES-Blowfish hybrid algorithm for the security of patient medical record data. Journal of Physics: Conference Series, 1007(1) (2018). https://doi.org/10.1088/1742-6596/1007/1/012018

Ajmal, A., Ibrar, S., & Amin, R.: Cloud computing platform: Performance analysis of prominent cryptographic algorithms. Concurrency and Computation: Practice and Experience, 34(15), 1–18 (2022). https://doi.org/10.1002/cpe.6938

Fatima, S., Rehman, T., Fatima, M., Khan, S., & Ali, M. A.: Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing. 14 (2022). https://doi.org/10.3390/engproc2022020014

Similar Articles

<< < 20 21 22 23 24 25 26 27 28 29 > >> 

You may also start an advanced similarity search for this article.