Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud

被引:10
|
作者
Amalarethinam, D. I. George [1 ]
Leena, H. M. [2 ]
机构
[1] Jamal Mohamed Coll Autonomous, Tiruchirappalli 620020, India
[2] Holy Cross Coll Autonomous, Comp Sci, Tiruchirappalli 620002, India
关键词
Cloud Computing; Data Security; RSA; Key size; Blocks;
D O I
10.1109/WCCCT.2016.50
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is a distributed and centralized network of inter connected and inter related systems with one or more IT resources provisioned based on pay-on-demand usage. Even though Cloud consumers or users are more flexible with cloud resources, there exist various issues which bring down the usage of cloud resources. Security issue is the major one among them. Data Security and Privacy, Identity and Access Management, Disaster Recovery/Business Continuity Planning etc., are some of the crisis related to data stored on the cloud. Since the cloud users are more concerned with their data, its security is a major issue which has to be dealt seriously. Securing the users' data can be achieved by the conventional method of Cryptography. Encryption is done by using any one of the popular symmetric or asymmetric key algorithms such as AES, DES, RSA, Blowfish and Triple DES etc., RSA algorithm which is a asymmetric key algorithm using two different keys for encryption and decryption processes. The Key size can be varied to make the encryption process strong. Hence it is difficult for the attackers to intrude dthe data. Increasing key size correspondingly increases the time taken for encryption and decryption process. The proposed algorithm reduces the time of encryption and decryption processes by dividing the file into blocks and enhances the strength of the algorithm by increasing the key size. This strength paves the way to store data in cloud by the users without any inconvenience.
引用
收藏
页码:172 / 175
页数:4
相关论文
共 50 条
  • [41] Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    Sankaran, K. Sakthidasan
    [J]. PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1031 - 1035
  • [42] Enhanced Cloud Security Implementation using Modified ECC Algorithm
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    Sankaran, K. Sakthidasan
    [J]. PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1019 - 1022
  • [43] An Enhanced Parallel Version of RSA Public Key Crypto Based Algorithm Using OpenMP
    Saxena, Rahul
    Jain, Monika
    Singh, Dushyant
    Kushwah, Ashutosh
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 37 - 42
  • [44] An implementation of RSA algorithm in google cloud using cloud SQL
    Saravanan, N.
    Mahendiran, A.
    Venkata Subramanian, N.
    Sairam, N.
    [J]. Research Journal of Applied Sciences, Engineering and Technology, 2012, 4 (19) : 3574 - 3579
  • [45] Security Features of Cloud Computing Using New Symmetric Key Algorithm
    Al-Maliki, Saeed Q. Al-Khalidi
    Alfifi, Fahad
    [J]. VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 51 - +
  • [46] An Enhanced Data Owner Centric Model for Ensuring Data Security in Cloud
    Bajwa, Maninder Singh
    Himani
    Kang, Sandeep Singh
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 500 - 503
  • [47] Proposed Symmetric Key Cryptography Algorithm for Data Security
    Anand, Abhishek
    Raj, Abhishek
    Kohli, Rashi
    Bibhu, Vimal
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 159 - 162
  • [48] Proposed hybrid RSA algorithm for cloud computing
    Rohini
    Sharma, Er Tejinder
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 60 - 64
  • [49] Data Security and Privacy using Data Partition and Centric key management in Cloud
    Patel, Krunal
    Kumar, Sendhil K. S.
    Singh, Navneet
    Parikh, Kushang
    Jaisankar, N.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [50] Enhanced Security Algorithm with Key Exchange Protocol in Wireless Network
    Princy, Infanta S.
    Revathi, G.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,