Cloud computing in cryptography and steganography
- PDF / 81,643 Bytes
- 5 Pages / 594 x 792 pts Page_size
- 64 Downloads / 222 Views
CLOUD COMPUTING IN CRYPTOGRAPHY AND STEGANOGRAPHY V. K. Zadirakaa† and A. M. Kudina‡
UDC 681.3:519.72:003.26
Abstract. We consider the new statements of problems in cryptography and steganography, which depend on the features of cloud systems. We also analyze the aspects of developing and implementing crypto- and steganosystems for cloud computing. Keywords: distributed computing systems, cloud computing, cryptography, multidigit arithmetics, Karatsuba method, side channel cryptanalysis, general theory of optimal algorithms.
1. Peculiarities of cloud information-communication technologies that determine new formulations of cryptography problems. Cloud-based information-communication systems (CICS) are an implementation of the theoretical concept of distributed computing systems [1]. Cloud systems became the object of study recently; therefore, there are several definitions of CICS. In the paper we use two main definitions, functional [2] and technological [3], which differ in the aspect of considering cloud systems. According to the functional definition, CICS are considered from the point of view of the opportunities they afford and include the systems where: — there are such features of information processing as self-service of users on request (grid computing), elastic (submitted in any necessary amount) computing power, a unified space of dynamically allocated computing resources of any type (without constraints for geographical position), possible remote access to system resources with the required velocity without constraint for geographical position of the user (which stipulates the use of high-speed mobile networks), exactly measurable computing resources; — there are models of service delivery such as the software (application software, including database management systems) as a service (SaaS, DbaaS), platform (operating system, etc.) as a service (PaaS), infrastructure (physical computing resources and virtual machines controlling them) as a service (IaaS); — there are cases of the use of system information resources such as a private cloud (resources belong to the client or are leased), social cloud (resources belong to some community, a typical example is social networks), public cloud (resources belong to the provider of cloud services), hybrid cloud. The technological definition of cloud computing is based on the joint application of two technologies: measurable distributed computing on demand, which originate in the grid technology [3], and virtualization, which allows efficient solution of the problem of software migration among heterogeneous elements of the distributed system. Proceeding from these definitions, we can determine the main features of cloud information–communication technologies, which provide new formulations of cryptography problems described below. Cloud computing systems (CCS) are characterized by the presence of asymmetric computing, which is a powerful cloud with almost unlimited computing capabilities and a set of terminal devices (including mobile ones), which pose the pro
Data Loading...