Top Banner
INTERNA TIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 4 63 ISSN 2347-4289 Copyright © 2014 IJTEEE. Performance Evalua tion Of New Hybrid Encryption Algorithms To Be Used For Mobile Cloud Computing Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed, Diaa Salama AbdElminaam Information Systems Department, Faculty of Computers and Informatics, Menofyia University, Egypt;  Information Technology Department, Faculty of Computers and Informatics, Menofyia University, Egypt; Scientific Computing Department, Faculty of Computers and Informatics, Banha University, Egypt; Information Systems Department, Faculty of Computers and Informatics, Banha University, Egypt Email: [email protected], [email protected], [email protected] g, [email protected]. eg ABSTRACT: Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client to overcome on the limitation of mobile devices and uses the main advantage of cloud computing. As mobile cloud computing continues to grow, so does the need for effective security mechanisms because data offloaded and moved from mobile to unknown destination. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has s ome drawbacks. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limit ations. For instance key m aintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. (RSA) algorithm and (Blowfish) are combined to provide authentication and (MD5) for integrity. We applied this protocol on one type of wireless sensor network (Zigbee) to be evaluated and compared it with other four hybrid cryptography protocol. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text. Keywords : Wireless Sensor networks (WSN); Information Security Systems (ISS); Advanced Encryption Standard (AES); Cryptography;Elliptic Curve (ECC); Message Digest-5;hybrid cryptographic algorithm. 1 INTRODUCTION Mobile devices, such as smartphones and tablets, increase in today’s corporate environments. While there are si gnificant opportunities to force these devices to increase the effective- ness of mobile workers, there are also significant concerns about the privacy of sensitive corporate data stored on the devices that IT must handle. But mobile devices face many resource challenges (battery life, storage, bandwidth etc).Cloud computing offers advantages to users by allowing them to use infrastructure, platforms and software by cloud providers at low cost and elastically in an on-demand fashion [1-3].Mobile cloud computing provides mobile users with data storage and processing services in clouds, obviating the need to have a powerful device configuration (e.g. CPU speed, memory capacity etc.), as all resource-intensive computing can be performed in the cloud [4]. Application code to be of- floaded to the cloud for execution is bundled in a mobile agent. Upon arrival at the destination (cloud host) platform; the bun- dle enables itself and starts executing its code As the important of Mobile Cloud Computing (MCC) increase so does the need to protect them(Fig.1)[5-8]. Encryption algo- rithms play good roles in information security systems (ISS) [9]. There are many different cryptographic algorithms to achieve the security services such as Authentication, Confi- dentiality, and Integrity.  Authentication: means preventing unauthorized par- ties from participating in the network.  Confidentiality: means keeping information secret from unauthorized parties.  Integrity: ensures the receiver that the received data Fig. 1. Mobile Cloud Computing Scenario .
9

Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

Jun 02, 2018

Download

Documents

ijteee
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 1/9

INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 4 63ISSN 2347-4289

Copyright © 2014 IJTEEE.

Performance Evaluation Of New Hybrid EncryptionAlgorithms To Be Used For Mobile CloudComputingHatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed, Diaa Salama AbdElminaam

Information Systems Department, Faculty of Computers and Informatics, Menofyia University, Egypt; 

Information Technology Department, Faculty of Computers and Informatics, Menofyia University, Egypt;Scientific Computing Department, Faculty of Computers and Informatics, Banha University, Egypt;Information Systems Department, Faculty of Computers and Informatics, Banha University, EgyptEmail: [email protected], [email protected], [email protected], [email protected]

ABSTRACT: Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralizedcomputing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client to overcome on the limitationof mobile devices and uses the main advantage of cloud computing. As mobile cloud computing continues to grow, so does the need for effectivesecurity mechanisms because data offloaded and moved from mobile to unknown destination. Encryption algorithms play good roles in informationsecurity systems (ISS). Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. Atpresent, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks. The presenasymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance

is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though keymaintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm isdesigned using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides threecryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) andadvanced encryption (AES) are combined to provide node encryption. (RSA) algorithm and (Blowfish) are combined to provide authentication and (MD5for integrity. We applied this protocol on one type of wireless sensor network (Zigbee) to be evaluated and compared it with other four hybridcryptography protocol. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and thesize of cipher text.

Keywords :Wireless Sensor networks (WSN); Information Security Systems (ISS); Advanced Encryption Standard (AES); Cryptography;Elliptic Curve(ECC); Message Digest-5;hybrid cryptographic algorithm.

1 INTRODUCTION Mobile devices, such as smartphones and tablets, increase intoday’s corporate environments. While there are significant

opportunities to force these devices to increase the effective-ness of mobile workers, there are also significant concernsabout the privacy of sensitive corporate data stored on thedevices that IT must handle. But mobile devices face manyresource challenges (battery life, storage, bandwidthetc).Cloud computing offers advantages to users by allowingthem to use infrastructure, platforms and software by cloudproviders at low cost and elastically in an on-demand fashion[1-3].Mobile cloud computing provides mobile users with datastorage and processing services in clouds, obviating the needto have a powerful device configuration (e.g. CPU speed,memory capacity etc.), as all resource-intensive computingcan be performed in the cloud [4]. Application code to be of-floaded to the cloud for execution is bundled in a mobile agent.

Upon arrival at the destination (cloud host) platform; the bun-dle enables itself and starts executing its code

As the important of Mobile Cloud Computing (MCC) increaseso does the need to protect them(Fig.1)[5-8]. Encryption algorithms play good roles in information security systems (ISS)[9]. There are many different cryptographic algorithms toachieve the security services such as Authentication, Confidentiality, and Integrity.

•  Authentication: means preventing unauthorized parties from participating in the network.

•  Confidentiality: means keeping information secretfrom unauthorized parties.

•  Integrity: ensures the receiver that the received data

Fig. 1. Mobile Cloud Computing Scenario .

Page 2: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 2/9

INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 4 64ISSN 2347-4289

Copyright © 2014 IJTEEE.

is not altered in transit by an adversary. Note that dataauthentication can provide data integrity also.

In this work we applied new proposed hybrid protocol on Zig-bee wireless sensor network (WSN) and comparing it with ex-istence hybrid protocol. There are two essential problems re-lated to security protocols arise in WSNs. Firstly, the overloadthat security protocols introduce in messages should be re-

duced at a minimum; every bit the sensor sends consumesenergy and, consequently, reduces the life of the device. Se-condly, the memory size which refers to size of encryptedmessage and key size should also be reduced [10]. Securitycan be provided at different settings with different security al-gorithms. The security settings can be different in many fac-tors, but the main factors are the choice of ciphers used toprove security functions, packet size, and data types. Dataencryption procedures are mainly into two categories depend-ing on the type of security keys used to encrypt/decrypt thesecured data(Fig.2) .the two categories are: Symmetric andAsymmetric keys encryption. In Symmetric keys encryption orsecret key encryption, only one key is used to encrypt anddecrypt data. The key should be distributed before transmis-

sion between entities. Keys play an important role. If weak keyis used in algorithm then everyone may decrypt the data.Strength of Symmetric key encryption depends on the size ofkey used. For the same algorithm, encryption using longer keyis harder to break than the one done using smaller key. Thereare many examples of cryptography algorithms like Blowfish,DES, RC6,and AES. Blowfish uses various (32-448); default128bits while AES is used various (128,192,256) bits keys [11-16]. Asymmetric key encryption is used to solve the problem ofkey distribution. In Asymmetric keys, two keys are used; pri-vate and public keys. Public key is used for encryption andprivate key is used for decryption .Because users tend to usetwo keys: public key, which is known to the public and privatekey which is known only to the user. There is no need for dis-

tributing them prior to transmission. Common asymmetric en-cryption algorithms include RSA and Elliptic Curve Cryptogra-phy (ECC) [17]. ECDSA - Elliptic Curve Digital Signature Algo-rithm [18] is used for authenticating a device or a messagesent by the device. ECDH  – Elliptic Curve Diffie Hellman [19]is a key agreement protocol that allows two parties to establisha shared secret key that can be used for private key algo-rithms. Both parties exchange some public information to eachother. RSA [20]is based on the presumed difficulty of factoringlarge integers, the factoring problem. Both Symmetric andAsymmetric cryptographic algorithms offer advantages anddisadvantages. Asymmetric algorithms provide more functio-nality than Symmetric algorithms, at the expense of speed andhardware cost. On the other hand Symmetric encryption pro-

vides cost-effective and efficient methods of securing datawithout compromising security and should be considered asthe correct and most appropriate security solution for manyapplications. In some instances, the best possible solutionmay be the complementary use of both Symmetric and Asym-metric encryption. Hybrid encryption attempts to exploit theadvantages of both kinds of algorithm classes, while avoidingtheir disadvantages. Hashing creates a unique, fixed-lengthsignature for a message or data set. It is commonly used tocheck data integrity. Message-digest (MD5) [21] algorithm is awidely used cryptographic hash function that produces a 128-bit (16-byte) hash value. It has been utilized in a wide varietyof security applications(Fig2).

In this paper, a new security protocol using hybrid cryptography algorithms is proposed. It is designed to provide data se

curity and users authenticity. It includes two phases at thesame time. Firstly, it takes the advantages of the combinationof both Symmetric and Asymmetric cryptographic techniquesusing both AES and ECC algorithms. Secondly, it takes theadvantages of the combination of both anther Symmetric andAsymmetric cryptographic techniques using both Blowfish andRSA algorithms.In addition, Hashing is also used for data integrity using MD5 to be ensured that the original text is not beingaltered in the communication medium. The proposed protocohas high operation speed, high security performance andstrong usability. The organization of this paper is as followsBrief overviews of the existing protocols are presented in Section 2. The proposed Hybrid Encryption Protocol is introducedin Section 3. Sections 4 present the numerical results and the

simulation results; respectively. Finally, the main conclusion ispresented in Section 5.

2 RELATED WORK 

1.  (Subasree) Security Protocol Architecture [22]This protocol is shown in Fig. 2. The given plain text can beencrypted with the help of ECC and the derived cipher text canbe communicated to the destination through any securedchannel. Simultaneously, the Hash value is calculated throughMD5 for the same plain text, which already has been con-verted into the cipher text by ECC. This Hash value has beenencrypted with DUAL RSA and the encrypted message of thisHash value also sent to the destination.

Fig. 2 differentiate between Symmetric, Asymme-tric,and hashing algorithms

Page 3: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 3/9

INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 4 65ISSN 2347-4289

Copyright © 2014 IJTEEE.

there are two disadvantages. First, the message is encryptedby Asymmetric Encryption Algorithms (ECC and DUAL RSAPublic key encryptions) that are slow compared to symmetric

encryption. Second,if an attacker determines a person's pri-vate key, his or her entire messages can be read.

2.  (Kumar) Security Protocol Architecture [23]The protocol architecture is shown in Fig. 3. The given plaintext is encrypted first with AES algorithm and then with ECCalgorithm. The Hash value of this encrypted cipher text is tak-en through the MD5 algorithm. On the other side, the Hashvalue is first evaluated and integrated. Thereafter, the decryp-tion of cipher text is done by AES and ECC decryption algo-rithms. Hence, the plaintext can be derived. The (Kumar) Se-curity Protocol is a combination of both the Symmetric andAsymmetric Cryptographic Techniques. However, the execu-tion time of this protocol is long because the plaintext is en-

crypted sequentially by both AES and ECC.

3.  (Kady) Security Protocol Architecture [ 24]The protocol architecture is shown in Fig. 4. The plaintext isdivided into n blocks Bi. Each block consists of 128 bits. Then,it is divided into two parts p1 blocks, and P2 blocks. The firstn/2 blocks are encrypted using (AES and ECC) . In parallel,the remaining n/2 blocks are encrypted using XOR-DUAL RSAalgorithm. Then hashing each two half using MD5 In the De-cryption Phase The decryption phase the cipher text is divided

into n blocks each block consists of 128 bits, Then it will di-vided into two parts ci blocks and Ci blocks. Hashing is used toidentify whether the source node receive the same cipher textor not. In the case of the hash values are the same at thesource and sink nodes, the first n/2 blocks are decrypted usingAES and ECC algorithms .The remaining n/2 blocks are decrypted using XNOR-DUAL RSA algorithm

4.  (Zhu) Security Protocol Architecture [25]This protocol is shown in the Fig. 5. The plaintext is encryptedwith Symmetric cipher algorithm, and the key and digital signature belonged to the Symmetric encryption algorithm are encrypted with Asymmetric key algorithm. The sender encryptsthe plaintext P with the key KAES belonged to the AES algorithm. To ensure the security of the cipher algorithm and simplify the key management, the sender uses the key KAES only

once. The receiver obtains the original information P after sig-nature verification. The main disadvantage of this protocol, thisprotocol suffers from low security level since that the messageis encrypted in a single phase which leads to less complexity.

Fig. 2 (Subasree) Security Protocol Architecture [22]

Fig. 3 (Kumar) Hybrid Protocol Architecture [23]

Fig. 4. (Elkady) Hybrid Protocol Architecture [24]

Fig. 5 (Zhu) Hybrid Protocol Architecture [25].

Page 4: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 4/9

Page 5: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 5/9

INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 4 67ISSN 2347-4289

Copyright © 2014 IJTEEE.

3.1 Decrypt ion Phase  The cipher text is divided into n blocks each block consists of128 bits, Then it will divided into two parts c i (0: n /2-1) blocksand Ci  (n /2: n-1) blocks. Hashing is used in order to identifywhether the sink node receive the same cipher text or not. InNHEP, if the Hash values in both phases are compared. Ifthey are the same, then the protocol will proceed the decryp-tion phase. Else, it will discard the message. In the case of the

hash values are the same at the source and sink nodes, thefirst n /2 blocks are decrypted using AES and ECC algorithmsas the following:

C = 0 < i ≤ n/2 -1  (11)

k i  = ECCdec (TCPK , K  j-1 )  0 < i ≤ n/2 -10 < j ≤ L-1 

(12)

The key of AES Kj with L length of bits is decrypted by ECC toproduce ki which his used to decrypt the cipher text using AESdecryption scheme by AESdec (AES decryption function).

mi = AESdec( K i ,ci  ) (13)

mi is P1, the first part of plain text.

The remaining n /2 blocks are decrypted using using BlowFish

and RSA algorithms as the following:C = n/2< i ≤n-1  (14)

k i  = RSAdec (d,n, K  j-1 )  n/2< i ≤n-10< j ≤ L-1 

(15) 

The key of Blowfish K j with L length of bits is decrypted by RSA  to produce ki which his used to decrypt the cipher text usingBlowf ish decryption scheme by DBlowFish (BlowFish decryptionfunction).

M i = D BlowFish( K j ,Ci  ) (16)

Mi is P2, the second part of plain text. At the final stage of thedecryption process, the two n /2 blocks are integrated to pro-duce plain text of n blocks.

M = mi + M i   (17)

  Proposed Decrypt ion Algor i thm

Input: C (Cipher text), D (Hashing value of cipher text), s (128bit size of block), L (key length), d i , D i , K (encrypted key usingECC, RSA);

Output : M (Plain text);1.  n = C/s;

 2.  let i=0;3.  do{

4.  ci  = first part of Cipher text;

5.  d i "=MD5(ci  );6.  Di " = MD5 (Ci  );7.  if (d i= d i ")&( Di = Di ")8.  {9.  for(j=0;j<= L-1;j++)10.  {

11.  k i = ECCdec (TCPK , K  j-1 ) ;12.  }13.  mi  = D  AES(K  j , ci  );14.  i++;15.  }16.  }17.  while(i<n/2);18.  i=n/2;

35. 

Give (d, p, q);19.  Do

 20.  for(j=0;j<= L-1;j++) 21.  { 22.  k i = RSAdec (d PK , K i-1 ) ; 23.  } 24.  M i  = D BlowFish(K i , Ci  ); 25.  i++; 26.  }36.  while(i<n);37.  M = mi + M i ;

Where n  is number of blocks, i  is a counting number, (d,p,q) isPrivate key of RSA for decryption process and MD5  is a hash

ing function.

3.3 Strength of NHEP

The strength of any cryptographic algorithm is based on thecomputational methods and the key used in the process. Innormal cryptographic approach the intruders may be able toidentify cipher text patterns that are transmitted to the destination side. By analyzing the sequence of bit patterns; it is possible for the intruder to identify which type of encryption algo-rithm is used or they will identify the key used for encryp-tion/decryption process. In NHEP, splitting the plain text improves the strength of the proposed protocol. The intruder wilbe not able to identify which type of specific algorithm is ap-plied to generate the cipher text. Thus, it is impossible to de-

crypt the cipher text. When mixing AES  with ECC , the encryption process is done by Symmetric scheme (AES ) which isfaster than Asymmetric scheme. The secret key of AES  is encrypted by ECC  which is more complicated than others. Alsowhen mixing BlowFish   with RSA , the encryption process isdone by Symmetric scheme (BlowFish ) which is faster thanAsymmetric scheme. The secret key of RSA   is encrypted byRSA  which is more complicated than others. So that we obtaintime reduction and power saving which is the advantage ofSymmetric encryption scheme .also we obtain the complexityof Asymmetric encryption scheme which is the advantage ofAsymmetric encryption scheme.

5 NUMERICAL RESULTS 

5.1 The size of the cipher textTable I describes the output of the encryption process. Itshows the size of the cipher text in bytes. It is shown that(Kumar) Protocol is the worst.

5.2 Time of Encryption and Decryption ProcessesThe encryption time is is considered the time that an encryp-tion algorithm takes to produce a cipher text from a plaintext.Encryption time is used to calculate the throughput of an en-cryption scheme. It indicates the speed of encryption. Thethroughput of the encryption scheme is calculated as the totaplaintext in bytes encrypted divided by the encryption time

Page 6: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 6/9

INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 4 68ISSN 2347-4289

Copyright © 2014 IJTEEE.

which can consider as a good indicator for power consumption[15]. The decryption time is the time that an decryption algo-rithm takes to produce a plaintext from a cipher text. Fig.6.shows the time of encryption process for different sizes ofplain text. It is shown that, NHEP  achieve the least time forencryption.

TABLE 1 

SIZE OF CIPHER TEXT (BYTES)

Sizeof

plaintext

(bytes)

Sub-asree Pro-

tocol

Ku-marPro-tocol 

ZhuPro-tocol

KadyPro-tocol

NHEP

1726  1726  1766  1726  1746  1726 

2512  2512  2556  2512  2519  2512 

8014  8014  8914  8014  8026  8014 

8992  8992  8998  8992  8996  8992 

12297  12297  12351  12297  12298  12297 

24597  24597  24622  24597  24621  24597 

49193  49193  49423  49193  49293  49193 

61489  61489  61489  61489  61589  61489 

As the Encryption time value is decreased, the power con-sumption of this encryption technique is decreased. Experi-mental results for this compassion point are shown Fig.6

accepted for publication, it is essential that the electronic ver

Table 2, Fig.7 shows the time of decryption process for differ-ent sizes of plain text. As in the encryption, it is clear that(Zhu) protocol and the proposed hybrid protocol have thesame results and the least time for decryption.

TABLE 2 TIME OF DECRYPTION (MS)

Sizeof

plaintext

(bytes)

Sub-asree Pro-

tocol

Ku-marPro-tocol 

ZhuPro-tocol

KadyPro-tocol

NHEP

1726  1119  1085  1000  950  101.850

2512  1161  1120  1016  956 106.8

40

8014  1196  1114  1261  965 194.6

14

8992  1277  1167  1328  976 125.2

42

12297  1283  1210  1426  983 156.6

65

24597  1291  1264  1623  996  510.912

49193  3170  1370  1730  1010  265.8

2861489  7566  5421  1847  1021 

263.433

Fig 7. Time of Decryption (ms)

The results show the superiority of NHEP algorithm over otheralgorithms in terms of the encryption and decryption timeprocessing time, and throughput (when we encrypt the samedata by using different five protocols, we found that NHEPrequires approximately 25% of the time which is consumed fo

the least of other five protocols). Another point can be noticedhere that ELKADY has an advantage over other four in termsof time consumption, and throughput. Finally, it is found thaKumar has low performance and low throughput when com-pared with other five algorithms.

2.3 ThroughputEnryption time is used to calculate the throughput of anencryption scheme. It indicates the speed of encryption. Thethroughput of the encryption scheme is calculated as:

Throughput of encryption = Tp (Bytes) / Et (Sec) (18)

where Tp is the total plain text (bytes) and Et  is the encryption

Fig. 6. Time of Encryption for each encryption protocol(ms).

Page 7: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 7/9

Page 8: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 8/9

INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 4 70ISSN 2347-4289

Copyright © 2014 IJTEEE.

offer better security for a shorter encryption and decryptiontime, and smallest cipher text size. There by, reducingprocessing overhead and achieving lower memory consump-tion that is appropriate for all WSN applications. Finally wesuggest three approaches to reduce the energy consumptionof security protocols: replacement of standard security protocolprimitives that consume high energy while maintaining thesame security level, modification of standard security protocols

appropriately, and a totally new design of security protocolwhere energy efficiency is the main focus.

ACKNOWLEDGMENT This study was supported by

 Faculty of Computers and Infor-

matics (Menofyia University, Banha University), Egypt

REFERENCES [1]  L. Wang, Gregor Laszewski, Marcel Kunze, Jie Tao, ―Cloud

Computing: A Perspective Study‖, New Generation Computing-Advances of Distributed Information Processing, pp. 137-146,vol. 28, no. 2, 2008.

[2]  R. Maggiani, Communication Consultant, Solari Commu-

nication, ―Cloud Computing is Changing How we Commu-nicate‖, 2009 IEEE International Professional Conference,IPCC, pp. 1-4, Waikiki, HI, USA, July 19- 22, 2009.

[3]  Harold C. Lin, Shivnath Babu, Jeffrey S. Chase, Sujay S.Parekh, ―Automated Control in Cloud Computing: Oppor-tunities and Challenges‖, Proc. of the 1st  Workshop onAutomated control for data centres and clouds, New York,NY, USA, pp. 13-18, 2009

[4]  Gaoyun Chen, Jun Lu and Jian Huang, Zexu Wu, ―SaaAS- The Mobile Agent based Service for Cloud Computing inInternet Environment‖, Sixth  International Conference onNatural Computation, ICNC 2010, pp. 2935-2939

[5]  Lori M. Kaufman, ―Data security in the world of cloud  computing‖, IEEE Security and Privacy Journal, vol. 7, is-sue. 4, pp. 61-64, July- Aug 2009

[6]  Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi LoIacon, ―On technical Security Issues in Cloud  Computing‖,Proc. of IEEE International Conference on Cloud Compu-ting (CLOUD-II, 2009), pp. 109-116, India, 2009.

[7]  Seny Kamara, Kristin Lauter, ―Cryptographic cloud  sto-rage‖, Lecture Notes in Computer Science, FinancialCryptography and Data Security, pp. 136-149, vol. 6054,2010

[8]  Julisch, K., & Hall, M., ―Security and control in the cloud‖,Information Security Journal: A Global Perspective, vol.19, no. 6, pp. 299-309, 2010.

[9]  S. Faye, and J. F. Myoupo, ―Secure and energy-efficientgeocast protocols for wireless sensor networks based ona hierarchical clustered structure,‖ International Journal ofNetwork Security, vol. 15, no.1, pp. 121-130, January2013.

[10] T. Bin, Y. Yi-Xian, L. Dong, L. Qi and X. Yang, ―A securityframework for wireless sensor networks,‖ The Journal of

China Universities of Posts and Telecommunications, vol17, pp.118-122, 2010.

[11] D. S. Abdu.Ellminaam, H. M. Abdul kader, M. M. Hadhoud―Performance Evaluation of Symmetric Encryption Algorithms, ‖ IJCSNS International Journal of ComputerScience and Network Security, VOL.8 No.12 pp: 280- 286December 2008.(ISSN: 1738-7906)

[12] D. S. Abdul_Elminaam, H. M. Abdul_ kader, M. M. Hadhoud, ― Evaluating The Effects of Symmetric Encryption Algorithms on Power Consumption for Wireless Devices‖IJICIS International Journal of Intelligent Computing andInformation Sciences, Vol.9 No.2,pp:143-159, July 2009.

[13] D. S. Abdul.Elminaam, H. M. Abdul kader, M. M. Hadhoud,Performanc.e" Studying the Effects of Most CommonEncryption Algorithms", International Arab Journal of eTechnology ( IAJeT),VOL.2,No.1,PP:1-10, January 2011

[14] D. S. Abdul.Elminaam, H. M. Abdul kader, M. M. Hadhoud" Evaluating the Effects of Cryptography Algorithms on

Power Consumption for Different Data Types".International Journal of Network Security ( IJNS),VOL.11No.2, pp: 91- 100, Sep 2010.

[15] D. S. Abdul.Elminaam, H. M. Abdul kader, M. M. Hadhoud." Evaluating the Performance of Symmetric Encryption Algorithms ".International Journal of Network Security( IJNS), VOL.10 No.3, pp: 216- 222, May 2010.

[16] D. S. Abdul.Elminaam, H. M. Abdul kader, M. M. Hadhoud―Tradeoffs between Energy Consumption and Security oSymmetric Encryption Algorithms‖, International Journal oComputer Theory and Engineering ( IJCTE),VOL.1 No.3pp: 342- 350, August 2009. (ISSN: 1793-821X).

[17] R. Kodali and N. Sarma, "Energy efficient ECC encryptionusing ECDH," Springer-Verlag, vol. 248, pp. 471-4782013.

[18] M. Balitanas, "Wi Fi protected access-pre-shared key hy-brid algorithm," International Journal of Advanced Scienceand Technolog, vol. 12, November 2009.

[19] D. Johnson, A. Menezes, and S. Vanstone, "The EllipticCurve Digital Signature Algorithm (ECDSA)," InternationaJournal of Information Security, vol. 1, no. 1, pp. 36-63August 2001.

[20] 

M. Frunza and Gh. Asachi, "Improved RSA encryptionalgorithm for increased security of wireless networks,"ISSCS International Symposium, vol. 2, July 2007.

[21] Md. A. Hossain, Md. K. Islam, S. K. Das and Md. A. Na-shiry ―Cryptanalyzing of message digest algorithms MD4and MD5‖, International Journal on Cryptography and Information Security (IJCIS), vol. 2, no.1, March 2012.

[22] S. Subasree and N. K. Sakthivel, ―Design of a new secur ity protocol using hybrid cryptography algorithms,‖ IJRRAS, vol. 2, no. 2, pp. 95-103, February 2010.

Page 9: Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

8/11/2019 Performance Evaluation of New Hybrid Encryption Algorithms to Be Used for Mobile Cloud Computing

http://slidepdf.com/reader/full/performance-evaluation-of-new-hybrid-encryption-algorithms-to-be-used-for-mobile 9/9

INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 4 71ISSN 2347-4289

Copyright © 2014 IJTEEE

[23] N. Kumar, "A Secure communication wireless sensor net-works through hybrid (AES+ECC) algorithm", von LAPLAMBERT Academic Publishing, vol. 386, 2012.

[24] W. Ren, and Z. Miao, " A new security protocol using hybr-id cryptography," In Proceedings of the 9th InternationalConference Computer Engineering Conference (ICEN-CO), 9th International, pp. 109-115, 2013.

[25] S. Zhu," Research of hybrid cipher algorithm application tohydraulic information transmission," In Proceedings of In-ternational Conference on Electronics, Communicationsand Control (ICECC), 2011.

[26] A. Lenstra, "Unbelievable security matching AES securityusing public key systems," Advances in Cryptology —ASIACRYPT, vol. 2248, pp. 67-86, December 2001.

[27] S. Tillich, J. Großschädl,"Accelerating AES using instruc-tion set extensions for Elliptic Curve cryptography," Com-putational Science and Its Applications  –  ICCSA, vol.3481, pp. 665-675, 2005.

[28] S. Al-alak, Z. Ahmed, A. Abdullah and S. Subramiam,"AES and ECC Mixed for ZigBee Wireless Sensor Securi-ty", World Academy of Science, Engineering and Technol-ogy, 2011.

Professor. Hatem. M. Abdul-kader obtained his BSC. And M.SC. (by re-search) both in Electrical Engineeringfrom the Alexandria University, Facultyof Engineering, Egypt in 1990 and 1995respectively. He obtained his Ph.D. de-gree in Electrical Engineering also fromAlexandria University, Faculty of Engi-

neering, and Egypt in 2001 specializingin neural networks and applications. He is currently a Lecturerin Information systems department, Faculty of Computers andInformation, Menoufya University, Egypt since 2004. He hasworked on a number of research topics and consulted for anumber of organizations.

Professor Mohiy Mohamed Hadhoud,Former vice president of Menoufia uni-versity for education and student affairsand former dean of Faculty of Com-puters and Information, University, She-bin Elkom, Egypt. Currently, he is thedean of Canadian International College

(CIC) in New Cairo. He is a member ofNational Promotion committee for pro-

fessors, he is a member of National Computers and Informat-ics Sector Planning committee, and is the University trainingsupervisor. Prof Hadhoud graduated from the department ofElectronics and Computer Science, Southampton University,UK,1987. Since 2001 he worked as a Professor of Multimedia,Signals and image processing and Head of the department ofInformation Technology (IT), He was a member of the univer-sity council. He is the recipient of the university supremacyaward for the year 2007. He, among others are the recipient ofthe Most cited paper award form the Digital signal processing

 journal, Vol.18, No. 4, July 2008, pp 677-678, ELSEVIER Pub-

lisher. Prof. Hadhoud has published more than 160 papers ininternational journals, international conferences, local journalsand local conferences. His fields of Interest: Digital SignaProcessing, 2-D Adaptive filtering, Digital Image ProcessingDigital communications, Multimedia applications, Informationsecurity and data hiding.

Professor.Salah M. Elsayed, Dean

Faculty of Computers and Informationhead of Scientific Computing Department, Benha University, Benha, EgyptHis PhD degree,in Numerical Analysisfrom the department of Numerical,Theory and Algorithms of NumericaLinear Algebra,and numerical methodsof ordinary and partial differential equations (multi-integral and finite differencemethods,A domain decomposition

method and chebychev pseudo spec trail methods. Prof Salahobtain Egyptian incentive prize of science in mathematics2002,and Scopus prize of Best Author have higher citation andH-Index in Scopus 2008 in the last ten years. Prof. Salah has

published more than 100 papers in international journals, in-ternational conferences, local journals and local conferencesHis fields of Interest: Numerical Analysis, numerical methodsof ordinary and partial differential equations, and Informationsecurity and data hiding.

Diaa Salama Abdul-Minaam was bornon November 23, 1982 in KafrSakrSharkia, Egypt. He received the B.Sfrom Faculty of Computers &InformaticsZagazig University, Egypt in 2004 withgrade very good with honor, and obtainsmaster degree in information systemfrom faculty of computers and informa

tion, menufia university, Egypt in 2009and submitted for PhD from Octobe

2009. He is working in Benha University,Egypt as teachingassistance at Faculty of Computer and informatics .Diaa hascontributed more than 18+ technical papers in the areas owireless networks, wireless network security, Information security and Internet applications in international journals, international conferences, local journals and local conferences. Hemajors in Cryptography and Network Security.(Mobile:+20166104747E-mail: ds_ [email protected]