JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Flexible Crypto System for IoT and Cloud Service
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Flexible Crypto System for IoT and Cloud Service
Kim, SeokWoo;
  PDF(new window)
 Abstract
As various IoT devices appear recently, Cloud Services such as DropBox, Amazon S3, Microsoft Azure Storage, etc are widely use for data sharing across the devices. Although, cryptographic algorithms like AES is prevalently used for data security, there is no mechanisms to allow selectively and flexibly use wider spectrum of lightweight cryptographic algorithms such as LEA, SEED, ARIA. With this, IoT devices with lower computation power and limited battery life will suffer from overly expensive workload and cryptographic operations are slower than what is enough. In this paper, we designed and implemented a CloudGate that allows client programs of those cloud services to flexibly select a cryptographic algorithms depending on the required security level. By selectively using LEA lightweight algorithms, we could achieve the cryptographic operations could be maximum 1.8 faster and more efficient than using AES.
 Keywords
IoT;Cloud Service;Crypto System;AES;LEA;
 Language
Korean
 Cited by
 References
1.
J. Cook, "Google Drive Now Has 10 Million Users: Available on iOS and Chrome OS," http://techcrunch.com/2012/06/28/google-drive-nowhas-10-million-users-available-on-ios-and-chrome-os-offline-editingin-docs/

2.
W. Santos, "76 Storage APIs: Box.net, Amazon S3, Dropbox," http://www.programmableweb.com/news/76-storage-apis-box.netamazon-s3-dropbox/2012/01/31

3.
C. Soghoian. How Dropbox sacrifices user privacy for cost savings, 2011. http://paranoia.dubfire.net/2011/04/howdropbox-sacrifices-user-privacy-for.html (last accessed: 07/13/2012)

4.
I. Drago, M. Mellia, M. M Munafo, A. Sperotto, R. Sadre, and A. Pras, "Inside Dropbox: Understanding Personal Cloud Storage Services," in The 2012 ACM conference on Internet measurement conference (IMC), Nov. 2012

5.
B. H. Kim and D. Lie, "Caelus: Verifying the consistency of cloud services with battery-powered devices," in SP'15. IEEE, 2015.

6.
BoxCryptor, https://www.boxcryptor.com/en

7.
D. Hong, J. Lee, D. Kim, D. Kwon, K. H. Ryu, and D. Lee, "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors" in Proc. WISA 2013, pp. 3-27, Jeju Island, Korea, Mar 2014.

8.
J. Park et al., "128-Bit Block Cipher LEA," TTAK.KO-12.0223, Dec. 2013.

9.
NIST, "Advanced Encryption Standard(AES)" Federal Information Processing Standard, FIPS PUB 197, Nov. 2001.

10.
J. Park, S. Lee, J. Kim, and J. Lee, The SEED Encryption Algorithm, RFC 4009, Feb. 2005.

11.
Korea Information Security Agency, www.kisa.or.kr , "ARIA , SEED"

12.
Cryptographic Module Validation Authority/Test organization, Cryptographic algorithm validation criteria (LEA, HEIGHT)", 2015.6

13.
Young-Seok Lee, "Authentication Method for Safe Internet of Things Environments", JKIIECT '15-02. Vol.8 No1, pp. 51-58, Feb. 2015.

14.
Byung-Joon Park, "Study on Face recongnition algorithm using the eye detection", JKIIECT '15-12. Vol.8 No6, pp. 491-496, Dec. 2015.