Abstract

This chapter evaluates the features and a computational load of two proposed cryptographic procedures which aim to protect confidentiality and data integrity in Cloud Computing (CC) systems. It should be kept in mind that a bad use of some cryptographic tools may negatively impact the overall CC operation. Regarding this, meeting the Quality of Service (QoS) requirements is only possible when the security layer applied does not interrupt the computing process. The security layer applied to tasks should also fulfill the advanced security conditions present in CC systems. Thus, the solutions aiming to protect both the user data as well as the whole system have to deliver the scalability, multi-tenancy and complexity that these systems demand. We present a cryptographic service based on blind RSA algorithm and Shamir secret sharing that supports batch tasks processing. Hence, this service is suitable for CC systems equipped with a monolithic central scheduler and many Virtual Machines (VMs) as working nodes. Blind RSA cryptographic system is used to encrypt the data without actually knowing any details about the tasks content. Shamir secret sharing procedure is proposed in order to assure whether all VMs in the system gave back their shares after deploying the batch of tasks on them or not.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call