Skip to main content

Analysis of Selected Cryptographic Services for Processing Batch Tasks in Cloud Computing Systems

  • Chapter
  • First Online:
Book cover Modeling and Simulation in HPC and Cloud Systems

Part of the book series: Studies in Big Data ((SBD,volume 36))

  • 748 Accesses

Abstract

This chapter evaluates the features and a computational load of two proposed cryptographic procedures which aim to protect confidentiality and data integrity in Cloud Computing (CC) systems. It should be kept in mind that a bad use of some cryptographic tools may negatively impact the overall CC operation. Regarding this, meeting the Quality of Service (QoS) requirements is only possible when the security layer applied does not interrupt the computing process. The security layer applied to tasks should also fulfill the advanced security conditions present in CC systems. Thus, the solutions aiming to protect both the user data as well as the whole system have to deliver the scalability, multi-tenancy and complexity that these systems demand. We present a cryptographic service based on blind RSA algorithm and Shamir secret sharing that supports batch tasks processing. Hence, this service is suitable for CC systems equipped with a monolithic central scheduler and many Virtual Machines (VMs) as working nodes. Blind RSA cryptographic system is used to encrypt the data without actually knowing any details about the tasks content. Shamir secret sharing procedure is proposed in order to assure whether all VMs in the system gave back their shares after deploying the batch of tasks on them or not.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amazon Web Services: https://aws.amazon.com

  2. Google Cloud: https://cloud.google.com

  3. Microsoft Cloud: http://www.microsoft.com/enterprise/microsoftcloud

  4. Adobe Creative Cloud: http://www.adobe.com/pl/creativecloud.html

  5. Cloud Controls Matrix Version 3.0.1, Cloud Security Alliance: https://cloudsecurityalliance.org/group/cloud-controls-matrix/

  6. Directive of the European Parliament and of the Council: On the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:31995L0046 (1995)

  7. Stinson, D.R.: Cryptography: Theory and Practice. CRC Press (2005)

    Google Scholar 

  8. Mell, P.M., Grance, T.: The NIST definition of cloud computing. SP 800-145. Technical Report (2011)

    Google Scholar 

  9. Jakbik, A., Grzonka, D., Koodziej, J.: Security supportive energy aware scheduling and scaling for cloud environments. pp. 583–590 (2017). https://www.scopus.com/inward/record.uri?eid=2-s2.0-85021827530&partnerID=40&md5=30d087573993bf732184bee293687bce. Cited by 0

  10. NIST Cloud Computing Standards Roadmap. SP 500-291, Version 2: Technical Report. https://www.nist.gov/sites/default/files/documents/itl/cloud/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf (2013)

  11. Gilly, K., Juiz, C., Thomas, N., Puigjaner, R.: Adaptive admission control algorithm in a QoS-aware web system. Inf. Sci. 199, 58–77 (2012). https://doi.org/10.1016/j.ins.2012.02.018, https://doi.org/10.1016/j.ins.2012.02.018

  12. Gupta, H., Dastjerdi, A.V., Ghosh, S.K., Buyya, R.: iFogSim: a toolkit for modeling and simulation of resource management techniques in internet of things, edge and fog computing environments. CoRR abs/1606.02007 (2016). http://arxiv.org/abs/1606.02007

  13. Suchacka, G., Borzemski, L.: Web Server Support for e-Customer Loyalty Through QoS Differentiation, pp. 89–107. Springer, Berlin Heidelberg (2013). https://doi.org/10.1007/978-3-642-53878-0_5, https://doi.org/10.1007/978-3-642-53878-0_5

  14. Jakóbik, A.: Big Data Security, pp. 241–261. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44881-7_12

  15. Jakóbik, A., Grzonka, D.: Energy efficient scheduling methods for computational grids and clouds. J. Telecommun. Inf. Technol. (2017)

    Google Scholar 

  16. Secure Hash Standard: Technical Report. https://doi.org/10.6028/NIST.FIPS.180-4 (2015)

  17. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979). https://doi.org/10.1145/359168.359176

  18. Schubert, G.R.: Algorithm 210: Lagrangian interpolation. Commun. ACM 6(10), 616 (1963). https://doi.org/10.1145/367651.367665

  19. Gauss, E.J.: A comparison of machine organizations by their performance of the iterative solution of linear equations. J. ACM 6(4), 476–485 (1959). https://doi.org/10.1145/320998.321001, https://doi.org/10.1145/320998.321001

  20. CloudSim: https://github.com/Cloudslab/cloudsim/

  21. Buyya, R., Ranjan, R., Calheiros, R.N.: Modeling and simulation of scalable cloud computing environments and the cloudsim toolkit: challenges and opportunities. In: 2009 International Conference on High Performance Computing Simulation, Leipzig, 2009, pp. 1–11. https://doi.org/10.1109/HPCSIM.2009.5192685

  22. Amazon Cloud EC2 Instance Types Tests: https://www.ec2instances.info/

  23. Amazon EC2 Instance Types Tests: http://www.cloudlook.com/amazon-ec2-m1-medium-instance

  24. Jakóbik, A., Grzonka, D., Kołodziej, J., Gonzalez-Velez, H.: Towards secure non-deterministic meta-scheduling for clouds. In: Proceedings of 30th European Conference on Modelling and Simulation, ECMS 2016, Regensburg, Germany, May 31–June 03, 2016, pp. 596–602. https://doi.org/10.7148/2016-0596

  25. Jakbik, A., Grzonka, D., Palmieri, F.: Non-deterministic security driven meta scheduler for distributed cloud organizations. Simulation Modell. Pract. Theory 76, 67–81 (2017). ISSN 1569-190X. https://doi.org/10.1016/j.simpat.2016.10.011

  26. Grzonka, D., Jakbik, A., Kołodziej, J., Pllana, S.: Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. Future Gener. Comput. Syst. (2017). ISSN 0167-739X. https://doi.org/10.1016/j.future.2017.05.046

  27. Amazon EC2 Instances: https://aws.amazon.com/ec2/instance-types/

  28. Linux Perf Command: https://perf.wiki.kernel.org/index.php/Main_Page

  29. Knill, O.: Probability and Stochastic Processes with Applications. Overseas Press (1994)

    Google Scholar 

  30. Koodziej, J.: Evolutionary Hierarchical Multi-criteria Metaheuristics for Scheduling in Large-Scale Grid Systems. Springer (2012)

    Google Scholar 

  31. Bayen, A.M., and Siauw, T.: Chapter 12–Linear Algebra and Systems of Linear Equations, In An Introduction to MATLAB\(^{\textregistered }\) Programming and Numerical Methods for Engineers, Academic Press, Boston, 2015, pp.177–200. ISBN 9780124202283. https://doi.org/10.1016/B978-0-12-420228-3.00012-9

  32. Jakbik A., Wilczynski, A.: Using polymatrix extensive stackelberg games in security aware resource allocation and task scheduling in computational clouds. J. Telecommun. Inf. Technol. (2017)

    Google Scholar 

Download references

Acknowledgements

This chapter is based upon work from COST Action IC1406 High-Performance Modelling and Simulation for Big Data Applications (cHiPSet), supported by COST (European Cooperation in Science and Technology).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Agnieszka Jakóbik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jakóbik, A., Tchórzewski, J. (2018). Analysis of Selected Cryptographic Services for Processing Batch Tasks in Cloud Computing Systems. In: Kołodziej, J., Pop, F., Dobre, C. (eds) Modeling and Simulation in HPC and Cloud Systems. Studies in Big Data, vol 36. Springer, Cham. https://doi.org/10.1007/978-3-319-73767-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73767-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73766-9

  • Online ISBN: 978-3-319-73767-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics