Analysis of Selected Cryptographic Services for Processing Batch Tasks in Cloud Computing Systems

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter evaluates the features and a computational load of two proposed cryptographic procedures which aim to protect confidentiality and data integrity in Cloud Computing (CC) systems. It should be kept in mind that a bad use of some cryptographic tools may negatively impact the overall CC operation. Regarding this, meeting the Quality of Service (QoS) requirements is only possible when the security layer applied does not interrupt the computing process. The security layer applied to tasks should also fulfill the advanced security conditions present in CC systems. Thus, the solutions aiming to protect both the user data as well as the whole system have to deliver the scalability, multi-tenancy and complexity that these systems demand. We present a cryptographic service based on blind RSA algorithm and Shamir secret sharing that supports batch tasks processing. Hence, this service is suitable for CC systems equipped with a monolithic central scheduler and many Virtual Machines (VMs) as working nodes. Blind RSA cryptographic system is used to encrypt the data without actually knowing any details about the tasks content. Shamir secret sharing procedure is proposed in order to assure whether all VMs in the system gave back their shares after deploying the batch of tasks on them or not.

Cite

CITATION STYLE

APA

Jakóbik, A., & Tchórzewski, J. (2018). Analysis of Selected Cryptographic Services for Processing Batch Tasks in Cloud Computing Systems. In Studies in Big Data (Vol. 36, pp. 135–155). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-73767-6_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free