Cryptographic Cloud Computing Environment as a More Trusted Communication Environment

Cryptographic Cloud Computing Environment as a More Trusted Communication Environment

Omer K. Jasim (Alma'arif University College, Anbar, Iraq), Safia Abbas (Ain Shams University, Cairo, Egypt), El-Sayed M. El-Horbaty (Ain Shams University, Cairo, Egypt) and Abdel-Badeeh M. Salem (Ain Shams University, Cairo, Egypt)
Copyright: © 2014 |Pages: 14
DOI: 10.4018/ijghpc.2014040103


Cloud Communication Environment is an internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources and services that belong to different organizations. In order to develop cloud computing applications, security and trust to share data through distributed resources must be assured. This paper offers a study of the different mechanisms used in open cloud environments such as keys generation and management, and encryption/decryption algorithms. In addition, the paper proposes a new cryptographic environment, annotated as “CCCE” that deploys the combination between quantum key distribution mechanisms (QKD) and advanced encryption standard (AES), and demonstrates how quantum mechanics can be applied to improve computation.
Article Preview


Recently, Cloud computing (CC) (Ateniese, Kamara, 2012) has widely been applied in several industrial fields such as Google, Facebook, Amazon, and (e-business, e-learning... etc.) and is considered a new communication technique that combines multiple disciplines such as parallel computing, distributed computing and grid computing. In return, it provides Virtualization, utility computing, and other multiple services for client enterprise (Ateniese, Kamara, 2012; CCA, 2013).

Basically, cloud computing main principles are based on sharing resources among separately distributed servers and individual clients. This sharing is performed by enabling free accessing of the stored files and data for all clients (CSA, 2013).

Despite the free data accessing is considered an advantage; it has several drawbacks such that any cloud client can manipulate any file transferred through cloud communication. Consequently, many companies have explored the critical areas in a CC environment.

CSA (2013) is an example of those companies, which delivers a package that contains cloud provider, clients and considers the security model. The CSA security model has the ability to interrupt the intruder, who is responsible for destroying and interrupting the original data files and communications.

Later on, the security guarantee issue in cloud communication environment has become a challenge and which attract many studies, such as Hail et al. (1999), who discuss the technical security issues arising from side channel - attacks, browser attacks, browsers’ related attacks, and authentication attacks.

Moreover, Jensen et al. (2009) discuss the security vulnerabilities existing in the cloud platform. They grouped the possible vulnerabilities into technology-related, cloud characteristics-related and security controls- related.

In spite of different studies’ attempts to solve the security problem in cloud communications, many gaps and threads are still uncovered or handled. In the meantime, all proposed attempts consider the main three building modules in the cloud communication architecture [see Figure 1]. However, none of these attempts care about the whole performance of the interaction between the constituent modules, which in turn, caused data transformation delaying (IDC, 2011; John, Ingo, 2010) and provide a high chance for the attackers to discover the main encryption key and intrude the data streams in the transferred files.

Figure 1.

Cloud environment architecture


This paper proposed a secured cloud computing environment annotated as “CCCE” in which, a hybrid technique is used in the encryption and decryption processes. The proposed hybrid technique combines the Advanced Encryption Standard Algorithm (AES) and QKD that generates the keys used for the encryption process randomly.

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing