ISSN: XXXX-XXXX

Adapting DES and AES Cryptography for Secure Cloud Computing EnvironmentsNarendra

Abstract

Increased concern about data security is now experienced with cloud computing, mainly on the aspect of data confidentiality of the CSP. This research examines the use of cryptographic algorithms such as DES and AES in cloud computing to alleviate the security risk. Simulations in Matlab R2009a are conducted based on a quantitative approach for evaluating the encryption speed, data security, and the resource usage of both algorithms. Findings show that although DES improves data security, the short key length and susceptibility to cryptographic attacks make it less efficient for large-scale cloud applications. On the other hand, AES has better security and scalability but is hindered by its computational intensity. The comparative analysis suggests that AES is a better choice for cloud security if optimization strategies overcome its resource-intensive nature. It, therefore, contributes to understanding solutions in cryptographic secure cloud computing and emphasizes the need for tailored encryption standards that respond to specific cloud security needs. Future research should further address emerging cryptographic technologies and real-world implications for diverse cloud environments.

References

  1. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson.
  2. Narendra Kumar, B. Srinivas and Alok Kumar Aggrawal: “Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques-2” I. J. Modern Education and Computer Science, 2012, 1, 33-39.(http://www.mecs-press.org/ DOI: 10.5815/ijmecs.2012.01.05)
  3. Anuj Kumar, Narendra Kumar and Alok Aggrawal: “An Analytical Study for Security and Power Control in MANET” International Journal of Engineering Trends and Technology, Vol 4(2), 105-107, 2013.
  4. Anuj Kumar, Narendra Kumar and Alok Aggrawal: “Balancing Exploration and Exploitation using Search Mining Techniques” in IJETT, 3(2), 158-160, 2012
  5. Anuj Kumar, Shilpi Srivastav, Narendra Kumar and Alok Agarwal “Dynamic Frequency Hopping: A Major Boon towards Performance Improvisation of a GSM Mobile Network” International Journal of Computer Trends and Technology, vol 3(5) pp 677-684, 2012.
  6. Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.
  7. Diffie, W., & Hellman, M. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
  8. Daemen, J., & Rijmen, V. (2002). The Design of Rijndael: AES - The Advanced Encryption Standard. Springer.
  9. NIST. (2001). Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197.
  10. Kelsey, J., Schneier, B., Wagner, D., & Hall, C. (1997). Cryptanalytic Attacks on Pseudorandom Number Generators. International Workshop on Fast Software Encryption, 168–188.
  11. Ferguson, N., & Schneier, B. (2003). Practical Cryptography. Wiley.
  12. Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), 199–212.
  13. Cloud Security Alliance (CSA). (2016). Best Practices for Securing Cloud Applications.
  14. Viega, J., & McGraw, G. (2001). Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley.
  15. Menezes, A., van Oorschot, P., & Vanstone, S. (1996). Handbook of Applied Cryptography. CRC Press.
  16. Singh, A., & Shrivastava, S. (2017). Overview of Attacks on Cryptographic Algorithms. Journal of Information Security, 8(1), 80–98.
  17. Song, D., Wagner, D., & Perrig, A. (2000). Practical Techniques for Searches on Encrypted Data. IEEE Symposium on Security and Privacy, 44–55.
  18. Wang, C., Ren, K., & Lou, W. (2010). Toward Publicly Auditable Secure Cloud Data Storage Services. IEEE Network, 24(4), 19–24.
  19. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120–126.
Download PDF

How to Cite

Narendra Kumar, Leszek Ziora, (2025-01-07 17:08:53.477). Adapting DES and AES Cryptography for Secure Cloud Computing EnvironmentsNarendra. Abhi International Journal of Computer Science and Engineering, Volume t768KLTMZCuRdtWVFLav, Issue 1.