Complexity
Performance
Traking and
managing
encryption key
Traking and
managing
authentication keys
Data Classification
Impact on OS, applications,
databases.
interoperability
Performance degradation;
degradation
Cost
Scalability
Initial acquisition cost
Deployment cost
From the above table 1, it is clear that the encryption would
affect the cloud application from various angles. So before
applying the encryption one should consider all possible
parameters which can be affected by encryption and avoid
unnecessary encryption of data items.
3. RELATED WORK
Data security in cloud computing is the emerging thrust area in
the research work. Lots of research work is being carried out in
data security in distributed networks like cloud and grid.
Information or data security helps us to ensure privacy and to
protect personal data. IEEE defines the data security as the
degree to which data is protected from exposure to accidental
or malicious alteration or destruction. More specifically
information security is defined as the preservation of CIA
(confidentiality, Integrity and accessibility).
Encryption of data is the widely used technique to secure the
confidential data. There are two basic types of encryption
techniques: symmetric (also known as conventional or secret
key) and asymmetric (public key). The most widely used
symmetric cryptography algorithm is the advanced encryption
standard (AES). One of the most interesting asymmetric
cryptography algorithm is the RSA, developed in 1977 by Ron
Rivest, Adi Shamir and Lan Adleman at MIT. Asymmetric
ciphers are much slower, and their key sizes must be much
larger than those used with symmetric cipher. So an interesting
technique proposed by researchers that combines and
synthesizes the high security of asymmetric cryptography
algorithms with the efficiency of the symmetric approach is
PGP (Pretty Good Privacy). In PGP data are encrypted by
using a symmetric cryptography. Then, in order to secure the
symmetric key, an asymmetric cryptography algorithm is
applied, since this ensures high security.
Zhidong Shen and Qiang Tong have worked on Trusted
Computing Technology in they have integrated Trusted
Computing platform in cloud computing [3]. The TCP will be
used in authentication, confidentiality and integrity in cloud
computing environment. The TCP can improve the cloud
computing security and will not bring much complexity to
users. Because the TCP is based on relatively independent
hardware modules, it does not cost too much resource of CPU,
and can improve the performance of processing cryptographic
computation[4].
So many authors are paying their attention in securing the
data in cloud but paying less attention on performance
degradation caused by the excessive and complicated
encryption techniques.
3. PERFORMANCE COMPARISONS
IDC conducted a survey of 244 IT executives about cloud
services. As figure 1 shows, security concern are the number
one issue facing cloud computing.
Performan
ce
Penalties
Secure
data at rest
Low
Database layer
Databa Column
se
Based
Based
Low
High
Middle
ware
layer
Applica
tion
Layer
High
high
Yes
Yes
Yes
Yes
Yes
Secure
data at rest
No
No
Yes
Yes
Yes
Products
Wind
ows
EFS,
Bit
Locke
r etc.
SQL
Server
2008
My
SQL,Or
acle
DB2
ect.
Hiberna
te/Jasyp
t
CONCLUSION
It is clear that data security is utmost requirement for the cloud
services providers to ensure confidentiality. But at the same
tine we can not ignore the performance degradation of the
cloud services due to excessive and some time unnecessary
encryption. So there should be some guide line to decide the
level of security required in cloud services. The encrypted data
takes more time in writing data items, reading data items and
even takes more space as compared to the unencrypted one. So
a encryption with no performance penalty can be used
FUTURE SCOPE
Performance of cloud application is a very important parameter
of QOS and SLA. It will be a good design of SLA if it
describes the performance level with multilayer security. In
order to adequately address security problem such as insider
Copy Right INDIACom-2011 ISSN 0973-7529 ISBN 978-93-80544-00-7