Have a personal or library account? Click to login

An ANN-based scalable hashing algorithm for computational clouds with schedulers

Open Access
|Dec 2021

References

  1. Abdoun, N., El Assad, S., Taha, M.A., Assaf, R., Deforges, O. and Khalil, M. (2016). Secure hash algorithm based on efficient chaotic neural network, 2016 International Conference on Communications (COMM), Bucharest, Romania, pp. 405–410.
  2. Aggarwal, K. and Verma, H.K. (2015). Hash RC6—variable length hash algorithm using RC6, 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, pp. 450–456.
  3. Al-Hamdani, W.A. (2011). Elliptic curve for data protection, Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD’11, New York, USA, pp. 1–14.
  4. Amazon (2019). Amazon EC2 instance types, Amazon Web Services, https://aws.amazon.com/ec2/instance-types/.
  5. Atkinson, K.E. (1978). An Introduction to Numerical Analysis, 2nd Edn, Wiley, Hoboken.
  6. Barbierato, E., Gribaudo, M., Iacono, M. and Jakóbik, A. (2019). Exploiting CloudSim in a multiformalism modeling approach for cloud based systems, Simulation Modelling Practice and Theory 93: 133–147.10.1016/j.simpat.2018.09.018
  7. Bellare, M. and Kohno, T. (2004). Hash function balance and its impact on birthday attacks, in C. Cachin and J.L. Camenisch (Eds), Advances in Cryptology, EUROCRYPT 2004, Springer, Berlin, pp. 401–418.10.1007/978-3-540-24676-3_24
  8. Bowen, P., Hash, J. and Wilson, M. (2006). Information Security Handbook: A Guide for Managers, NIST Special Publication 800-100, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf.
  9. Butcher, J.C. (2008). Numerical Methods for Ordinary Differential Equations, 2nd Edn, Wiley, Hoboken10.1002/9780470753767
  10. Chugunkov, I.V., Ivanov, M.A. and Kliuchnikova, B.V. (2019). Hash functions are based on three-dimensional stochastic transformations, 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg/Moscow, Russia, pp. 202–205.
  11. Cococcioni, M. (2021). Mackey–Glass time series generator, MathWorks, https://www.mathworks.com/matlabcentral/fileexchange/24390-mackey-glass-time-series-generator.
  12. CSA (2011). Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance, Bellingham, https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/csaguide.v3.0.pdf.
  13. Du, Y., He, G. and Yu, D. (2016). Efficient hashing technique based on bloom filter for high-speed network, 8th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, Vol. 01, pp. 58–63.
  14. Dworkin, M.J. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf.
  15. ENISA (2009). Cloud Computing: Benefits, Risks and Recommendations for Information Security, European Network and Information Security Agency, Athens, https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security.
  16. Fernandez-Cerero, D., Jakóbik, A., Grzonka, D., Kołodziej, J. and Fernandez-Montes, A. (2018). Security supportive energy-aware scheduling and energy policies for cloud environments, Journal of Parallel and Distributed Computing 119: 191–202.10.1016/j.jpdc.2018.04.015
  17. Fernandez-Cerero, D., Fernandez-Montes, A., Jakóbik, A., Kołodziej, J. and Toro, M. (2018). SCORE: Simulator for cloud optimization of resources and energy consumption, Simulation Modelling Practice and Theory 82: 160–173.10.1016/j.simpat.2018.01.004
  18. Gholipour, A., Araabi, B.N. and Lucas, C. (2006). Predicting chaotic time series using neural and neurofuzzy models: A comparative study, Neural Processing Letters 24(3): 217–239.10.1007/s11063-006-9021-x
  19. Gong, Z. (2016). Survey on lightweight hash functions, Journal of Cryptologic Research 3(1): 1–11.
  20. Google (2016). Encryption at rest in Google Cloud, Google Cloud Documentation, https://cloud.google.com/security/encryption/default-encryption.
  21. Grzonka, D. (2018). Intelligent Agent-based Monitoring Systems of Task Scheduling for Distributed High-Performance Environments, PhD thesis, Polish Academy of Sciences, Warsaw.
  22. Grzonka, D., Jakóbik, A., Kołodziej, J. and Pllana, S. (2018). Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security, Future Generation Computer Systems 86: 1106–1117.10.1016/j.future.2017.05.046
  23. Haykin, S. (1998). Neural Networks: A Comprehensive Foundation, 2nd Edn, Prentice Hall, Upper Saddle River.
  24. Huang, W. and Wang, L. (2019). A hash function based on sponge structure with chaotic map for spinal codes, 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), Beijing, China, pp. 1–5.
  25. ISO/IEC (2005). Information Technology—Security Techniques—Code of Practice for Information Security Management, ISO/IEC 27002:2005, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://www.iso.org/standard/50297.html.
  26. ISO/IEC (2015). Information Technology—Security Techniques—Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services, ISO/IEC 27017:2015, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://www.iso.org/standard/43757.html.
  27. Jakóbik, A. (2016). Big data security, in F. Pop et al. (Eds), Resource Management for Big Data Platforms: Algorithms, Modelling, and High-Performance Computing Techniques, Springer, Cham, pp. 241–261, DOI: 10.1007/978-3-319-44881-7_12.10.1007/978-3-319-44881-7_12
  28. Jakóbik, A., Grzonka, D. and Kołodziej, J. (2017a). Security supportive energy aware scheduling and scaling for cloud environments, European Conference on Modelling and Simulation, ECMS 2017, Budapest, Hungary, pp. 583–590.
  29. Jakóbik, A., Grzonka, D. and Palmieri, F. (2017b). Non-deterministic security driven meta scheduler for distributed cloud organizations, Simulation Modelling Practice and Theory 76: 67–81.10.1016/j.simpat.2016.10.011
  30. Jakóbik, A., Grzonka, D., Kołodziej, J. and González-Vélez, H. (2016). Towards secure non-deterministic meta-scheduling for clouds, 30th European Conference on Modelling and Simulation, ECMS 2016, Regensburg, Germany, pp. 596–602, DOI: 10.7148/2016-0596.10.7148/2016-0596
  31. Jakóbik, A. and Wilczynski, A. (2017). Using polymatrix extensive Stackelberg games in security-aware resource allocation and task scheduling in computational clouds, Journal of Telecommunications and Information Technology 1: 71–80.
  32. Jankowski, N. and Linowiecki, R. (2019). A fast neural network learning algorithm with approximate singular value decomposition, International Journal of Applied Mathematics and Computer Science 29(3): 581–594, DOI: 10.2478/amcs-2019-0043.10.2478/amcs-2019-0043
  33. Kaur, N., Saini, H.S. and Singh, R. (2009). Design and analysis of secure scheduler for MLS distributed database systems, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 1400–1404.
  34. Kidon, M. and Dobai, R. (2017). Evolutionary design of hash functions for IP address hashing using genetic programming, IEEE Congress on Evolutionary Computation (CEC), Donostia, Spain, pp. 1720–1727.
  35. Kołodziej, J. (2012). Evolutionary Hierarchical Multi-Criteria Metaheuristics for Scheduling in Large-Scale Grid Systems, Springer, Berlin.10.1007/978-3-642-28971-2
  36. Yee, L.P. and De Silva, L.C. (2002). Application of multilayer perceptron network as a one-way hash function, International Joint Conference on Neural Networks. IJCNN’02, Honolulu, USA, Vol. 2, pp. 1459–1462.
  37. Mahjoob, M.J., Abdollahzade, M., Zarringhalam, R. and Kalhor, A. (2008). Chaotic time series forecasting using locally quadratic fuzzy neural models, 9th WSEAS International Conference on Fuzzy Systems, Sofia, Bulgaria, pp. 26–32.
  38. Menezes, A.J., Vanstone, S.A. and Oorschot, P.C.V. (1996). Handbook of Applied Cryptography, CRC Press, Boca Raton.
  39. Merkle, R.C. (1979). Secrecy, Authentication, and Public Key Systems, Stanford University, Stanford, pp. 11–16.
  40. Mohan, S., Yoon, M.K., Pellizzoni, R. and Bobba, R. (2014). Real-time systems security through scheduler constraints, 26th Euromicro Conference on Real-Time Systems, Madrid, Spain, pp. 129–140.
  41. NIST (2015). Secure Hash Standard (SHS), FIPS PUB 180-4, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf.
  42. NIST (2019). Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process, NISTIR 8268, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8268.pdf.
  43. Podolskiy, V., Jindal, A. and Gerndt, M. (2019). Multilayered autoscaling performance evaluation: Can virtual machines and containers co-scale?, International Journal of Applied Mathematics and Computer Science 29(2): 227–244, DOI: 10.2478/amcs-2019-0017.10.2478/amcs-2019-0017
  44. Rajeshwaran, K. and Anil Kumar, K. (2019). Cellular automata based hashing algorithm (CABHA) for strong cryptographic hash function, 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, pp. 1–6.
  45. Saleh, M. and Dong, L. (2013). Real-time scheduling with security enhancement for packet switched networks, IEEE Transactions on Network and Service Management 10(3): 271–285.10.1109/TNSM.2013.071813.120299
  46. Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, New York.
  47. Singh, M. and Garg, D. (2009). Choosing best hashing-strategies and hash functions, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 50–55.
  48. Tadokoro, H., Kourai, K. and Chiba, S. (2010). A secure system-wide process scheduler across virtual machines, 2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing, Tokyo, Japan, pp. 27–36.
  49. Tchórzewski, J. and Jakóbik, A. (2019). Theoretical and experimental analysis of cryptographic hash functions, Journal of Telecommunications and Information Technology 1: 125–133.10.26636/jtit.2019.128018
  50. Tchórzewski, J., Jakóbik, A. and Grzonka, D. (2019). Towards ANN-based scalable hashing algorithm for secure task processing in computational clouds, 33rd International ECMS Conference on Modelling and Simulation, Caserta, Italy, pp. 421–427.
  51. Turcanik, M. (2017a). Hash function generation based on neural networks and chaotic maps, Communication and Information Technologies (KIT), Vysoke Tatry, Slovakia, pp. 1–5.10.23919/KIT.2017.8109467
  52. Turcanik, M. (2017b). Using recurrent neural network for hash function generation, International Conference on Applied Electronics (AE), Pilsen, Chech Republic, pp. 1–4.10.23919/AE.2017.8053625
  53. Wang, M. and Li, Y. (2015). Hash function with variable output length, International Conference on Network and Information Systems for Computers, Wuhan, China, pp. 190–193.
  54. Yang, Q., Gao, T., Fan, L. and Gu, Q. (2009). Analysis of one-way alterable length hash function based on cell neural network, 5th International Conference on Information Assurance and Security, Xi’an, China, Vol. 1, pp. 391–395.
DOI: https://doi.org/10.34768/amcs-2021-0048 | Journal eISSN: 2083-8492 | Journal ISSN: 1641-876X
Language: English
Page range: 697 - 712
Submitted on: Jan 31, 2021
Accepted on: Aug 10, 2021
Published on: Dec 30, 2021
Published by: University of Zielona Góra
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2021 Jacek Tchórzewski, Agnieszka Jakóbik, Mauro Iacono, published by University of Zielona Góra
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.