PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

An ANN-based scalable hashing algorithm for computational clouds with schedulers

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The significant benefits of cloud computing (CC) resulted in an explosion of their usage in the last several years. From the security perspective, CC systems have to offer solutions that fulfil international standards and regulations. In this paper, we propose a model for a hash function having a scalable output. The model is based on an artificial neural network trained to mimic the chaotic behaviour of the Mackey–Glass time series. This hashing method can be used for data integrity checking and digital signature generation. It enables constructing cryptographic services according to the user requirements and time constraints due to scalable output. Extensive simulation experiments are conduced to prove its cryptographic strength, including three tests: a bit prediction test, a series test, and a Hamming distance test. Additionally, flexible hashing function performance tests are run using the CloudSim simulator mimicking a cloud with a global scheduler to investigate the possibility of idle time consumption of virtual machines that may be spent on the scalable hashing protocol. The results obtained show that the proposed hashing method can be used for building light cryptographic protocols. It also enables incorporating the integrity checking algorithm that lowers the idle time of virtual machines during batch task processing.
Rocznik
Strony
697--712
Opis fizyczny
Bibliogr. 54 poz., rys., tab.
Twórcy
  • Faculty of Computer Science and Telecommunications, Cracow University of Technology, ul. Warszawska 24, 31-155 Cracow, Poland; Faculty of Computer Science, Electronics and Telecommunications, AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Cracow, Poland
  • Faculty of Computer Science and Telecommunications, Cracow University of Technology, ul. Warszawska 24, 31-155 Cracow, Poland
autor
  • Department of Mathematics and Physics, University of Campania “Luigi Vanvitelli”, viale Lincoln 5, 81100 Caserta, Italy
Bibliografia
  • [1] Abdoun, N., El Assad, S., Taha, M.A., Assaf, R., Deforges, O. and Khalil, M. (2016). Secure hash algorithm based on efficient chaotic neural network, 2016 International Conference on Communications (COMM), Bucharest, Romania, pp. 405–410.
  • [2] Aggarwal, K. and Verma, H.K. (2015). Hash RC6—variable length hash algorithm using RC6, 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, pp. 450–456.
  • [3] Al-Hamdani, W.A. (2011). Elliptic curve for data protection, Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD’11, New York, USA, pp. 1–14.
  • [4] Amazon (2019). Amazon EC2 instance types, Amazon Web Services, https://aws.amazon.com/ec2/instance-types/.
  • [5] Atkinson, K.E. (1978). An Introduction to Numerical Analysis, 2nd Edn, Wiley, Hoboken.
  • [6] Barbierato, E., Gribaudo, M., Iacono, M. and Jakóbik, A. (2019). Exploiting CloudSim in a multiformalism modeling approach for cloud based systems, Simulation Modelling Practice and Theory 93: 133–147.
  • [7] Bellare, M. and Kohno, T. (2004). Hash function balance and its impact on birthday attacks, in C. Cachin and J.L. Camenisch (Eds), Advances in Cryptology, EUROCRYPT 2004, Springer, Berlin, pp. 401–418.
  • [8] Bowen, P., Hash, J. and Wilson, M. (2006). Information Security Handbook: A Guide for Managers, NIST Special Publication 800-100, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf.
  • [9] Butcher, J.C. (2008). Numerical Methods for Ordinary Differential Equations, 2nd Edn, Wiley, Hoboken.
  • [10] Chugunkov, I.V., Ivanov, M.A. and Kliuchnikova, B.V. (2019). Hash functions are based on three-dimensional stochastic transformations, 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg/Moscow, Russia, pp. 202–205.
  • [11] Cococcioni, M. (2021). Mackey-Glass time series generator, MathWorks, https://www.mathworks.com/matlabcentral/fileexchange/24390-mackey-glass-time-series-generator.
  • [12] CSA (2011). Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance, Bellingham, https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/csaguide.v3.0.pdf.
  • [13] Du, Y., He, G. and Yu, D. (2016). Efficient hashing technique based on bloom filter for high-speed network, 8th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, Vol. 01, pp. 58–63.
  • [14] Dworkin, M.J. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf.
  • [15] ENISA (2009). Cloud Computing: Benefits, Risks and Recommendations for Information Security, European Network and Information Security Agency, Athens, https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security.
  • [16] Fernandez-Cerero, D., Jakóbik, A., Grzonka, D., Kołodziej, J. and Fernandez-Montes, A. (2018). Security supportive energy-aware scheduling and energy policies for cloud environments, Journal of Parallel and Distributed Computing 119: 191–202.
  • [17] Fernandez-Cerero, D., Fernandez-Montes, A., Jakóbik, A., Kołodziej, J. and Toro, M. (2018). SCORE: Simulator for cloud optimization of resources and energy consumption, Simulation Modelling Practice and Theory 82: 160–173.
  • [18] Gholipour, A., Araabi, B.N. and Lucas, C. (2006). Predicting chaotic time series using neural and neurofuzzy models: A comparative study, Neural Processing Letters 24(3): 217–239.
  • [19] Gong, Z. (2016). Survey on lightweight hash functions, Journal of Cryptologic Research 3(1): 1–11.
  • [20] Google (2016). Encryption at rest in Google Cloud, Google Cloud Documentation, https://cloud.google.com/security/encryption/default-encryption.
  • [21] Grzonka, D. (2018). Intelligent Agent-based Monitoring Systems of Task Scheduling for Distributed High-Performance Environments, PhD thesis, Polish Academy of Sciences, Warsaw.
  • [22] Grzonka, D., Jakóbik, A., Kołodziej, J. and Pllana, S. (2018). Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security, Future Generation Computer Systems 86: 1106–1117.
  • [23] Haykin, S. (1998). Neural Networks: A Comprehensive Foundation, 2nd Edn, Prentice Hall, Upper Saddle River.
  • [24] Huang, W. and Wang, L. (2019). A hash function based on sponge structure with chaotic map for spinal codes, 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), Beijing, China, pp. 1–5.
  • [25] ISO/IEC (2005). Information Technology-Security Techniques-Code of Practice for Information Security Management, ISO/IEC 27002:2005, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://w ww.iso.org/standard/50297.html.
  • [26] ISO/IEC (2015). Information Technology-Security Techniques-Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services, ISO/IEC 27017:2015, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://www.iso.org/standard/43757.html.
  • [27] Jakóbik, A. (2016). Big data security, in F. Pop et al. (Eds), Resource Management for Big Data Platforms: Algorithms, Modelling, and High-Performance Computing Techniques, Springer, Cham, pp. 241–261, DOI: 10.1007/978-3-319-44881-7 12.
  • [28] Jakóbik, A., Grzonka, D. and Kołodziej, J. (2017a). Security supportive energy aware scheduling and scaling for cloud environments, European Conference on Modelling and Simulation, ECMS 2017, Budapest, Hungary, pp. 583–590.
  • [29] Jakóbik, A., Grzonka, D. and Palmieri, F. (2017b). Non-deterministic security driven meta scheduler for distributed cloud organizations, Simulation Modelling Practice and Theory 76: 67–81.
  • [30] Jakóbik, A., Grzonka, D., Kołodziej, J. and González-Vélez, H. (2016). Towards secure non-deterministic meta-scheduling for clouds, 30th European Conference on Modelling and Simulation, ECMS 2016, Regensburg, Germany, pp. 596–602, DOI: 10.7148/2016-0596.
  • [31] Jakóbik, A. and Wilczynski, A. (2017). Using polymatrix extensive Stackelberg games in security-aware resource allocation and task scheduling in computational clouds, Journal of Telecommunications and Information Technology 1: 71–80.
  • [32] Jankowski, N. and Linowiecki, R. (2019). A fast neural network learning algorithm with approximate singular value decomposition, International Journal of Applied Mathematics and Computer Science 29(3): 581–594, DOI: 10.2478/amcs-2019-0043.
  • [33] Kaur, N., Saini, H.S. and Singh, R. (2009). Design and analysis of secure scheduler for MLS distributed database systems, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 1400–1404.
  • [34] Kidon, M. and Dobai, R. (2017). Evolutionary design of hash functions for IP address hashing using genetic programming, IEEE Congress on Evolutionary Computation (CEC), Donostia, Spain, pp. 1720–1727.
  • [35] Kołodziej, J. (2012). Evolutionary Hierarchical Multi-Criteria Metaheuristics for Scheduling in Large-Scale Grid Systems, Springer, Berlin.
  • [36] Yee, L.P. and De Silva, L.C. (2002). Application of multilayer perceptron network as a one-way hash function, International Joint Conference on Neural Networks. IJCNN’02, Honolulu, USA, Vol. 2, pp. 1459–1462.
  • [37] Mahjoob, M.J., Abdollahzade, M., Zarringhalam, R. and Kalhor, A. (2008). Chaotic time series forecasting using locally quadratic fuzzy neural models, 9th WSEAS International Conference on Fuzzy Systems, Sofia, Bulgaria, pp. 26–32.
  • [38] Menezes, A.J., Vanstone, S.A. and Oorschot, P.C.V. (1996). Handbook of Applied Cryptography, CRC Press, Boca Raton.
  • [39] Merkle, R.C. (1979). Secrecy, Authentication, and Public Key Systems, Stanford University, Stanford, pp. 11–16.
  • [40] Mohan, S., Yoon, M.K., Pellizzoni, R. and Bobba, R. (2014). Real-time systems security through scheduler constraints, 26th Euromicro Conference on Real-Time Systems, Madrid, Spain, pp. 129–140.
  • [41] NIST (2015). Secure Hash Standard (SHS), FIPS PUB 180-4, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf.
  • [42] NIST (2019). Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process, NISTIR 8268, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8268.pdf.
  • [43] Podolskiy, V., Jindal, A. and Gerndt, M. (2019). Multilayered autoscaling performance evaluation: Can virtual machines and containers co-scale?, International Journal of Applied Mathematics and Computer Science 29(2): 227–244, DOI: 10.2478/amcs-2019-0017.
  • [44] Rajeshwaran, K. and Anil Kumar, K. (2019). Cellular automata based hashing algorithm (CABHA) for strong cryptographic hash function, 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, pp. 1–6.
  • [45] Saleh, M. and Dong, L. (2013). Real-time scheduling with security enhancement for packet switched networks, IEEE Transactions on Network and Service Management 10(3): 271–285.
  • [46] Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, New York.
  • [47] Singh, M. and Garg, D. (2009). Choosing best hashing-strategies and hash functions, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 50–55.
  • [48] Tadokoro, H., Kourai, K. and Chiba, S. (2010). A secure system-wide process scheduler across virtual machines, 2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing, Tokyo, Japan, pp. 27–36.
  • [49] Tchórzewski, J. and Jakóbik, A. (2019). Theoretical and experimental analysis of cryptographic hash functions, Journal of Telecommunications and Information Technology 1: 125–133.
  • [50] Tchórzewski, J., Jakóbik, A. and Grzonka, D. (2019). Towards ANN-based scalable hashing algorithm for secure task processing in computational clouds, 33rd International ECMS Conference on Modelling and Simulation, Caserta, Italy, pp. 421–427.
  • [51] Turcanik, M. (2017a). Hash function generation based on neural networks and chaotic maps, Communication and Information Technologies (KIT), Vysoke Tatry, Slovakia, pp. 1–5.
  • [52] Turcanik, M. (2017b). Using recurrent neural network for hash function generation, International Conference on Applied Electronics (AE), Pilsen, Chech Republic, pp. 1–4.
  • [53] Wang, M. and Li, Y. (2015). Hash function with variable output length, International Conference on Network and Information Systems for Computers, Wuhan, China, pp. 190–193.
  • [54] Yang, Q., Gao, T., Fan, L. and Gu, Q. (2009). Analysis of one-way alterable length hash function based on cell neural network, 5th International Conference on Information Assurance and Security, Xi’an, China, Vol. 1, pp. 391–395.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-d55815a0-7380-41b6-98be-7fd0cd0afe0e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.