A Review of Encryption Algorithms for Enhancing Data Security in Cloud Computing
Keywords:
Cryptography, Cloud Computing, Symmetric and Asymmetric Algorithms, Hybrid Encryption, Lightweight Algorithms, Security RequirementsAbstract
Cloud computing is one of the most rapidly evolving technologies today; it provides numerous advantages that increase its affordability and dependability for use in the company. This paper goes over the concepts of cloud computing, such as its characteristics, deployment model, and service model, discusses the various benefits of cloud computing, and highlights the most pressing issues and security concerns in cloud storage. As a consequence, that leads to a review of distinctive cryptography algorithms that meet the security requirements (CIA: confidentiality, integrity, and availability) that are used to secure communications in cloud computing situations. It also displays many algorithms depending on the previous studies, such as Blowfish, RSA, DES, AES, MD5, Feistel, SP, HIGHT, LED, Cybpher, PRESENT, RC6, Diamond2, mCrypton, SLIM, Klein, PUFFIN-2, SEA, CLEFIA, LBlock, TWINE, 2, ANU, ANU-II, NLBSIT, Piccolo, BORON, RECTANGLE, LICI, QTL, LOGIC, TRIVIUM, Fruit-v2, Fruit-80, A4, the Enocoro family, and Grain family, to make a comparison among them using many measurements. It found that modern and lightweight algorithms are more suitable for use in this field. Furthermore, the purpose of this paper is to make some suggestions for improving the safety and security of cloud computing technologies.
References
T. Ramaporkalai, “Security Algorithms in Cloud Computing,” International Journal of Computer Science Trends and Technology (IJCST), vol. 5, Volume 5 Issue 2, Mar – Apr 2017, [Online]. Available: www.ijcstjournal.org
M. Fouad Alharbi, F. Aldosari, B. Soh, and N. Fouad Alharbi, “Review of Some Cryptographic Algorithms In Cloud Computing,” IJCSNS International Journal of Computer Science and Network Security, vol. 21, no. 9, p. 41, 2021, doi: 10.22937/IJCSNS.2021.21.9.5.
A. Huth and J. Cebula, “The Basics of Cloud Computing,” US-CERT, 2011. [Online]. Available: https://www.cisa.gov/sites/default/files/publications/USCERT-CloudComputingHuthCebula.pdf
S. Jagirdar, J. Srinivas, K. Venkata, S. Reddy, and A. M. Qyser, “CLOUD COMPUTING BASICS,” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 5, July 2012. [Online]. Available: www.ijarcce.com
N. Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Computers and Electrical Engineering, vol. 71, pp. 28–42, Oct. 2018, doi: 10.1016/j.compeleceng.2018.06.006.
W. Stallings, Cryptography and Network Security: Principles and Practice, 8th ed. Pearson, 2020, ISBN-13: 9780135764213.
D.-A. Kumar Pandey Ram Manohar, “A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing AN ANALYSIS OF DATA SECURITY AND PRIVACY IN CLOUD COMPUTING View project Survey of the State of Art of QoS Modeling Approaches View project Ijdiic Ijdiic”, doi: 10.5281/zenodo.7464700.
E. Altulaihan, A. Alismail, E. Altulihan, R. Bukhowah, and M. Frikha, “SECURITY THREATS, COUNTERMEASURES AND DATA ENCRYPTION TECNHINQUIES ON THE CLOUD COMPUTING ENVIROMENT,” J Theor Appl Inf Technol, vol. 15, no. 5, 2023, [Online]. Available: https://www.researchgate.net/publication/369336958
O. R. Arogundade, “Addressing Cloud Computing Security and Visibility Issues,” IARJSET, vol. 10, no. 3, Mar. 2023, doi: 10.17148/IARJSET.2023.10321.
S. Mukherjee, “Cloud-Based Security Solutions,” 2019. DOI: 10.6084/m9.figshare.8312708.
Cloud Security Alliance, July 06, 2022, "Top Threats to Cloud Computing: Pandemic 11 Report". [Online]. Available: https://cloudsecurityalliance.org/press-releases/2022/06/07/cloud-security-alliance-s-top-threats-to-cloud-computing-pandemic-11-report-finds-traditional-cloud-security-issues-becoming-less-concerning/.[Accessed: Jun. 05, 2023].
A. N. Quttoum, “Interconnection structures, management and routing challenges in cloud-service data center networks: A survey,” International Journal of Interactive Mobile Technologies, vol. 12, no. 1, pp. 36–60, 2018, doi: 10.3991/ijim.v12i1.7573.
H. A. Naman, N. A. Hussien, M. L. Al-dabag, and H. T. S. AlRikabi, “Encryption System for Hiding Information Based on Internet of Things,” International Journal of Interactive Mobile Technologies, vol. 15, no. 2, pp. 172–183, 2021, doi: 10.3991/ijim.v15i02.19869.
M. Ali, L. Tang Jung, A. Hassan Sodhro, A. Ali Laghari, S. Birahim Belhaouari, and Z. Gillani, “A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security,” Alexandria Engineering Journal, vol. 64, pp. 749–760, Feb. 2023, doi: 10.1016/j.aej.2022.10.056.
A. B. Mailewa, T. L. Moore, S. S. Conlon, A. U. Hewarathna, T. B. M. Dissanayaka, and A. B. Mailewa, “Encryption Methods and Key Management Services for Secure Cloud Computing: A Review.” [Online]. Available: https://www.researchgate.net/publication/369777264.
K. Shaik, A. Professor, N. Sharath Kumar, T. Venkat, and N. Rao, “Implementation of Encryption Algorithm for Data Security in Cloud Computing,” International Journal of Advanced Research in Computer Science, vol. 8, no. 3, 2017, [Online]. Available: www.ijarcs.info.
A. Hussain, C. Xu, and M. Ali, “Security of Cloud Storage System Using Various Cryptographic Techniques,” IOSR Journal of Mathematics, vol. 15, pp. 62–68, doi: 10.9790/5728-1505016268.
S. S. Khan and Prof. R. R. Tuteja, “Security in Cloud Computing using Cryptographic Algorithms,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 03, no. 01, pp. 148–154, Feb. 2015, doi: 10.15680/ijircce.2015.0301035.
I. A. Awan, M. Shiraz, M. U. Hashmi, Q. Shaheen, R. Akhtar, and A. Ditta, “Secure Framework Enhancing AES Algorithm in Cloud Computing,” Security and Communication Networks, vol. 2020, 2020, doi: 10.1155/2020/8863345.
K. K. Chennam, L. Muddana, and R. K. Aluvalu, “Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud,” in RTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedings, Institute of Electrical and Electronics Engineers Inc., Jul. 2017, pp. 2030–2033. doi: 10.1109/RTEICT.2017.8256955.
Z. Gong, S. Nikova, and Y. W. Law, “KLEIN: A new family of lightweight block ciphers,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, pp. 1–18. doi: 10.1007/978-3-642-25286-0_1.
P. Princy, "A Comparison of Symmetric Key Algorithms DES, AES, Blowfish, RC4, RC6: A Survey", International Journal of Computer Science & Engineering Technology (IJCSET), vol. 6, no. 05, May 2015, ISSN: 2229-3345.
F. Thabit, A. P. S. Alhomdy, A. H. A. Al-Ahdal, and P. D. S. Jagtap, “A new lightweight cryptographic algorithm for enhancing data security in cloud computing,” Global Transitions Proceedings, vol. 2, no. 1, pp. 91–99, Jun. 2021, doi: 10.1016/j.gltp.2021.01.013.
J. Rokan, N. Maher Naser, and J. Rokan Naif, “A systematic review of ultra-lightweight encryption algorithms,” Int. J. Nonlinear Anal. Appl, vol. 13, pp. 2008–6822, 2022, doi: 10.22075/ijnaa.2022.6167.
J. Wolosevicz, M. Bertaccini “An Introduction to a New Lightweight Encryption Algorithm: Cybpher” Jack Wolosevicz's Lab, March 2023.
A. Halim, “Issues in Lightweight Encryption Algorithm For mHealth A formulation of intelligent algorithm for real time and calculation simplicity for Human Security System based on genetic algorithm approach. View project.” [Online]. Available: https://www.researchgate.net/publication/367295749
J. Rokan, and N. M. Naser, “NEW ULTRA-LIGHTWEIGHT IoT ENCRYPTION ALGORITHM USING NOVEL CHAOTIC SYSTEM," International Journal on ‘Technical and Physical Problems of Engineering (IJTPE), Issue, vol. 53, pp. 253–259, 2022, [Online]. Available: www.iotpe.com.
S. A. Qassir, M. T. Gaata, and A. T. Sadiq, “Modern and Lightweight Component-based Symmetric Cipher Algorithms,” ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, vol. 10, no. 2, pp. 152–168, Dec. 2022, doi: 10.14500/aro.11007.
P. Mell and T. Grance, “The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology” Computer Security Division Information Technology Laboratory National Institute of Standards and Technology, Gaithersburg, MD, 20899-8930. 2011.
B. Gastermann, M. Stopper, A. Kossik, and B. Katalinic, “Secure implementation of an on-premises cloud storage service for small and medium-sized enterprises,” in Procedia Engineering, Elsevier Ltd, 2015, pp. 574–583. doi: 10.1016/j.proeng.2015.01.407.
D. Puzas, Jan. 26, 2023 "CLOUD SECURITY ISSUES: RISKS, THREATS, AND CHALLENGES". [Online]. Available: https://www.crowdstrike.com. [Accessed: Jun. 05, 2023].
W. Chai, "Cloud Service Provider". [Online]. Available: https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider. [Accessed: Jun. 05, 2023].
Amazon Web Services, 2023 "AWS Documentation". [Online]. Available: https://docs.aws.amazon.com. [Accessed: Jun. 05, 2023].
Microsoft Azure, 2023, "Introduction to Azure security". [Online]. Available: https://learn.microsoft.com/en-us/azure/security/fundamentals/overview. [Accessed: Jun. 05, 2023].
Microsoft Azure, 2023, "Microsoft Defender for Cloud". [Online]. Available: https://azure.microsoft.com/en-us/products/defender-for-cloud/#overview. [Accessed: Jun. 05, 2023].
Google Cloud, 2023, "Why Google Cloud". [Online]. Available: https://cloud.google.com/why-google-cloud/. [Accessed: Jun. 05, 2023].
R. Verma, “SIMULATION-BASED COMPARATIVE ANALYSIS OF SYMMETRIC ALGORITHMS,” International Journal of Advanced Research in Computer Science, vol. 11, no. 5, pp. 64–69, Oct. 2020, doi: 10.26483/ijarcs.v11i5.6655.
Anitha Y, “Security Issues in Cloud Computing-A Review.” International Journal of Thesis Projects and Dissertation (IJTPD), Vol. 1, Issue 1, PP: (1-6), Month: October-December 2013, [Online]. Available: www.researchpublish.com
“A BRIEF HISTORY OF ENCRYPTION (AND CRYPTOGRAPHY),” thalesgroup, May 25, 2023. https://www.thalesgroup.com/en/markets/digital-identity-and-security/magazine/brief-history-encryption (accessed Jun. 05, 2023).
A. Bhardwaj, G. V. B. Subrahmanyam, V. Avasthi, and H. Sastry, “Security Algorithms for Cloud Computing,” in Procedia Computer Science, Elsevier B.V., 2016, pp. 535–542. doi: 10.1016/j.procs.2016.05.215.
K. A. Scarfone, M. P. Souppaya, and M. Sexton, “Guide to storage encryption technologies for end user devices,” Gaithersburg, MD, 2007. doi: 10.6028/NIST.SP.800-111.
E. Barker, “Recommendation for key management: part 1,” NIST SP 800-57 Part 1 Rev. 5, Gaithersburg, MD, May 2020. doi: 10.6028/NIST.SP.800-57pt1r5.
“What is the Encryption Key Management Lifecycle?,” webpage: thales group, May 25, 2023. https://cpl.thalesgroup.com/faq/key-secrets-management/what-encryption-key-management-lifecycle (accessed Jun. 05, 2023).