Cryptographic Solutions for Data Security in Cloud Computing


A Run Time Trend-based Comparison of NCS, ERSA, and EHS

Abstract:

Due to the recent explosion in the amount of data being created by various social media platforms, e-commerce websites, and other businesses, a paradigm shift from on-site data centers to the cloud is required. Concerns about privacy and secrecy have been a major obstacle to the mainstream adoption of cloud computing. The best approach to protect the confidentiality and privacy of cloud data is by using cryptographic techniques. Researchers have developed several cryptographic algorithms, but they all have lengthy, linear, predictable, memory-intensive execution times. The performance of the CPU, memory, run-time trend, and throughput of the three cryptographic schemes: Enhanced RSA (ERSA), Non-Deterministic Cryptographic Scheme (NCS), and Enhanced Homomorphic Scheme (EHS) are compared using RAsys. The experiment’s results demonstrated that NCS and EHS produced non-linear and non-deterministic run times. Again, NCS and EHS produced the lowest throughput and memory consumption for text and numeric data types when data sizes of 5n*102(KB(∈1,2,4,10,20,40) were processed. However, ERSA produced a run-time trend that was deterministic, linear, and predictable.

Authors:

  • John Kwao Dawson, Computer Science Department, Sunyani Technical University, Sunyani, Ghana
  • Frimpong Twum, Computer Science Department, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana
  • James Benjamin Hayfron Acquah, Computer Science Department, Sunyani Technical University, Sunyani, Ghana
  • Yaw Marfo Missah, Computer Science Department, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

Cite:

Dawson JK, Twum F, Acquah JBH, Missah YM. Cryptographic Solutions for Data Security in Cloud Computing: : A Run Time Trend-based Comparison of NCS, ERSA, and EHS. JCSANDM [Internet]. 2024 Feb. 12 [cited 2024 Mar. 26];13(02):265-82. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/22861

DOI: https://doi.org/10.13052/jcsm2245-1439.1324



Source link