Abstract
This chapter evaluates the features and a computational load of two proposed cryptographic procedures which aim to protect confidentiality and data integrity in Cloud Computing (CC) systems. It should be kept in mind that a bad use of some cryptographic tools may negatively impact the overall CC operation. Regarding this, meeting the Quality of Service (QoS) requirements is only possible when the security layer applied does not interrupt the computing process. The security layer applied to tasks should also fulfill the advanced security conditions present in CC systems. Thus, the solutions aiming to protect both the user data as well as the whole system have to deliver the scalability, multi-tenancy and complexity that these systems demand. We present a cryptographic service based on blind RSA algorithm and Shamir secret sharing that supports batch tasks processing. Hence, this service is suitable for CC systems equipped with a monolithic central scheduler and many Virtual Machines (VMs) as working nodes. Blind RSA cryptographic system is used to encrypt the data without actually knowing any details about the tasks content. Shamir secret sharing procedure is proposed in order to assure whether all VMs in the system gave back their shares after deploying the batch of tasks on them or not.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amazon Web Services: https://aws.amazon.com
Google Cloud: https://cloud.google.com
Microsoft Cloud: http://www.microsoft.com/enterprise/microsoftcloud
Adobe Creative Cloud: http://www.adobe.com/pl/creativecloud.html
Cloud Controls Matrix Version 3.0.1, Cloud Security Alliance: https://cloudsecurityalliance.org/group/cloud-controls-matrix/
Directive of the European Parliament and of the Council: On the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:31995L0046 (1995)
Stinson, D.R.: Cryptography: Theory and Practice. CRC Press (2005)
Mell, P.M., Grance, T.: The NIST definition of cloud computing. SP 800-145. Technical Report (2011)
Jakbik, A., Grzonka, D., Koodziej, J.: Security supportive energy aware scheduling and scaling for cloud environments. pp. 583–590 (2017). https://www.scopus.com/inward/record.uri?eid=2-s2.0-85021827530&partnerID=40&md5=30d087573993bf732184bee293687bce. Cited by 0
NIST Cloud Computing Standards Roadmap. SP 500-291, Version 2: Technical Report. https://www.nist.gov/sites/default/files/documents/itl/cloud/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf (2013)
Gilly, K., Juiz, C., Thomas, N., Puigjaner, R.: Adaptive admission control algorithm in a QoS-aware web system. Inf. Sci. 199, 58–77 (2012). https://doi.org/10.1016/j.ins.2012.02.018, https://doi.org/10.1016/j.ins.2012.02.018
Gupta, H., Dastjerdi, A.V., Ghosh, S.K., Buyya, R.: iFogSim: a toolkit for modeling and simulation of resource management techniques in internet of things, edge and fog computing environments. CoRR abs/1606.02007 (2016). http://arxiv.org/abs/1606.02007
Suchacka, G., Borzemski, L.: Web Server Support for e-Customer Loyalty Through QoS Differentiation, pp. 89–107. Springer, Berlin Heidelberg (2013). https://doi.org/10.1007/978-3-642-53878-0_5, https://doi.org/10.1007/978-3-642-53878-0_5
Jakóbik, A.: Big Data Security, pp. 241–261. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44881-7_12
Jakóbik, A., Grzonka, D.: Energy efficient scheduling methods for computational grids and clouds. J. Telecommun. Inf. Technol. (2017)
Secure Hash Standard: Technical Report. https://doi.org/10.6028/NIST.FIPS.180-4 (2015)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979). https://doi.org/10.1145/359168.359176
Schubert, G.R.: Algorithm 210: Lagrangian interpolation. Commun. ACM 6(10), 616 (1963). https://doi.org/10.1145/367651.367665
Gauss, E.J.: A comparison of machine organizations by their performance of the iterative solution of linear equations. J. ACM 6(4), 476–485 (1959). https://doi.org/10.1145/320998.321001, https://doi.org/10.1145/320998.321001
CloudSim: https://github.com/Cloudslab/cloudsim/
Buyya, R., Ranjan, R., Calheiros, R.N.: Modeling and simulation of scalable cloud computing environments and the cloudsim toolkit: challenges and opportunities. In: 2009 International Conference on High Performance Computing Simulation, Leipzig, 2009, pp. 1–11. https://doi.org/10.1109/HPCSIM.2009.5192685
Amazon Cloud EC2 Instance Types Tests: https://www.ec2instances.info/
Amazon EC2 Instance Types Tests: http://www.cloudlook.com/amazon-ec2-m1-medium-instance
Jakóbik, A., Grzonka, D., Kołodziej, J., Gonzalez-Velez, H.: Towards secure non-deterministic meta-scheduling for clouds. In: Proceedings of 30th European Conference on Modelling and Simulation, ECMS 2016, Regensburg, Germany, May 31–June 03, 2016, pp. 596–602. https://doi.org/10.7148/2016-0596
Jakbik, A., Grzonka, D., Palmieri, F.: Non-deterministic security driven meta scheduler for distributed cloud organizations. Simulation Modell. Pract. Theory 76, 67–81 (2017). ISSN 1569-190X. https://doi.org/10.1016/j.simpat.2016.10.011
Grzonka, D., Jakbik, A., Kołodziej, J., Pllana, S.: Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. Future Gener. Comput. Syst. (2017). ISSN 0167-739X. https://doi.org/10.1016/j.future.2017.05.046
Amazon EC2 Instances: https://aws.amazon.com/ec2/instance-types/
Linux Perf Command: https://perf.wiki.kernel.org/index.php/Main_Page
Knill, O.: Probability and Stochastic Processes with Applications. Overseas Press (1994)
Koodziej, J.: Evolutionary Hierarchical Multi-criteria Metaheuristics for Scheduling in Large-Scale Grid Systems. Springer (2012)
Bayen, A.M., and Siauw, T.: Chapter 12–Linear Algebra and Systems of Linear Equations, In An Introduction to MATLAB\(^{\textregistered }\) Programming and Numerical Methods for Engineers, Academic Press, Boston, 2015, pp.177–200. ISBN 9780124202283. https://doi.org/10.1016/B978-0-12-420228-3.00012-9
Jakbik A., Wilczynski, A.: Using polymatrix extensive stackelberg games in security aware resource allocation and task scheduling in computational clouds. J. Telecommun. Inf. Technol. (2017)
Acknowledgements
This chapter is based upon work from COST Action IC1406 High-Performance Modelling and Simulation for Big Data Applications (cHiPSet), supported by COST (European Cooperation in Science and Technology).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Jakóbik, A., Tchórzewski, J. (2018). Analysis of Selected Cryptographic Services for Processing Batch Tasks in Cloud Computing Systems. In: Kołodziej, J., Pop, F., Dobre, C. (eds) Modeling and Simulation in HPC and Cloud Systems. Studies in Big Data, vol 36. Springer, Cham. https://doi.org/10.1007/978-3-319-73767-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-73767-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73766-9
Online ISBN: 978-3-319-73767-6
eBook Packages: EngineeringEngineering (R0)