Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud

被引:10
|
作者
Amalarethinam, D. I. George [1 ]
Leena, H. M. [2 ]
机构
[1] Jamal Mohamed Coll Autonomous, Tiruchirappalli 620020, India
[2] Holy Cross Coll Autonomous, Comp Sci, Tiruchirappalli 620002, India
关键词
Cloud Computing; Data Security; RSA; Key size; Blocks;
D O I
10.1109/WCCCT.2016.50
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is a distributed and centralized network of inter connected and inter related systems with one or more IT resources provisioned based on pay-on-demand usage. Even though Cloud consumers or users are more flexible with cloud resources, there exist various issues which bring down the usage of cloud resources. Security issue is the major one among them. Data Security and Privacy, Identity and Access Management, Disaster Recovery/Business Continuity Planning etc., are some of the crisis related to data stored on the cloud. Since the cloud users are more concerned with their data, its security is a major issue which has to be dealt seriously. Securing the users' data can be achieved by the conventional method of Cryptography. Encryption is done by using any one of the popular symmetric or asymmetric key algorithms such as AES, DES, RSA, Blowfish and Triple DES etc., RSA algorithm which is a asymmetric key algorithm using two different keys for encryption and decryption processes. The Key size can be varied to make the encryption process strong. Hence it is difficult for the attackers to intrude dthe data. Increasing key size correspondingly increases the time taken for encryption and decryption process. The proposed algorithm reduces the time of encryption and decryption processes by dividing the file into blocks and enhances the strength of the algorithm by increasing the key size. This strength paves the way to store data in cloud by the users without any inconvenience.
引用
收藏
页码:172 / 175
页数:4
相关论文
共 50 条
  • [1] Magnifying the Key Stability of RSA Algorithm in Data Security for Public Cloud
    Kamal, M.
    Ravi, G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 805 - 812
  • [2] Data security in cloud using RSA
    Yellamma, Pachipala
    Narasimham, Challa
    sreenivas, Velagapudi
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [3] An Enhanced hybrid Data Security Algorithm for Cloud
    Soman, Vikas K.
    Natarajan, V
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 416 - 419
  • [4] Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm
    Mahalle, Vishwanath S.
    Shahade, Aniket K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC), 2014, : 146 - 149
  • [5] Enhanced Cloud Data Security Using AES Algorithm
    Akhil, K. M.
    Kumar, Praveen M.
    Pushpa, B. R.
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [6] Security Analysis of an RSA Key Generation Algorithm with a Large Private Key
    Kong, Fanyu
    Yu, Jia
    Wu, Lei
    [J]. INFORMATION SECURITY, 2011, 7001 : 95 - +
  • [7] Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing
    Gautam, Pratiksha
    Ansari, Mohd Dilshad
    Sharma, Surender Kumar
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : 59 - 69
  • [8] Enhanced Cloud Security Framework To Confirm Data Security on Asymmetric And Symmetric Key Encryption
    Jayapandian, N.
    Rahman, A. M. J. Md. Zubair
    Radhikadevi, S.
    Koushikaa, M.
    [J]. 2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [9] ANALYSIS AND DESIGN OF ENHANCED RSA ALGORITHM TO IMPROVE THE SECURITY
    Mathur, Shikha
    Goar, Vishal
    Gupta, Deepika
    Kuri, Manoj
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [10] Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
    Puri, Neha A.
    Karare, Ajay R.
    Dharmik, Rajesh. C.
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1667 - 1671