Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment

Authors

  • Yadav R Dept. of Computer Science & Engineering TIEIT Bhopal, India
  • Singh K Dept. of Computer Science & Engineering TIEIT Bhopal, India
  • Saxena A Dept. of Computer Science & Engineering TIEIT Bhopal, India

DOI:

https://doi.org/10.26438/ijcse/v8i8.5660

Keywords:

Data security, AES, RC6, MD5, cloud computing

Abstract

Cloud Computing is the technology, which is growing more and more in the area of information technology. It is a big platform to deliver services to user. It provides with the benefit of storage, configuration, resources and sharing and all this is possible in cloud environment. Data is outsourced by the owner to store it on cloud because they have to serve there user at every possible stage. Presented work establishes security approach to secure and enhance the security of data at every step. Purpose of proposed work is to prevent from intruders and attackers and from sniffing messages. Proposed work is implemented using hybrid system (RC6+AES) and MD5 to calculate integrity. Using essential measurements like integrity, confidentiality, encryption, authentication, and authorization security in achieved in presented work.

References

[1] C Akshita Bhandari, Ashutosh Gupta, Debasis D, "A framework for Data Security and Storage in Cloud Computing", International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 1-7, 2016

[2] B. Samanthula,Y. Elmehdwi, G. Howser and S. Madria, "A secure data sharing and query processing framework via federation of cloud computing", Information Systems, vol. 48, pp. 196-212, 2015.

[3] B. Shereek, "Improve Cloud Computing Security Using RSA Encryption WithFermats Little Theorem", IOSR Journal of Engineering, vol. 4, no. 2, pp. 01-08, 2014.

[4] C. Y. Chen and J. F. Tu2, "A Novel Cloud Computing Algorithm of Security and Privacy", Hindawi Publishing Corporation: Mathematical Problems in Engineering, 2013.

[5] G. L. Prakash, M. Prateek and I. Singh, "Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System", International Journal Of Engineering And Computer Science, vol. 3, issue 4, pp. 5215-5223, April 2014.

[6] ChorB,GilboaN,Naor M, "Private Information Retrieval by Keywords", Report 98-03, Theory of Cryptography Library, 1998.

[7] Arora, Rachna, Anshu Parashar, "Secure user data in cloud computing using encryption algorithms", International Journal of Engineering Research and Applications, Vol. 3, pp.1922-1926, 2013.

[8] Wang, Cong, "Privacy-preserving public auditing for secure cloud storage", Computers, IEEE Transactions on Vol 62.2, pp 362-375, 2013.

[9] D. Zissis and D. Lekkas, "Addressing cloud computing security issues", Elsevier Journal of Future Generation Computer Systems, vol. 28, pp. 583-592, 2012.

[10] F. F. Moghaddam, M. T. Alrashdan and O. Karimi, "A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments", Journal of Advances in Computer Network, vol. 1, No. 3, Sep. 2013.

Downloads

Published

2020-08-31
CITATION
DOI: 10.26438/ijcse/v8i8.5660
Published: 2020-08-31

How to Cite

[1]
R. Yadav, K. Singh, and A. saxena, “Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment”, Int. J. Comp. Sci. Eng., vol. 8, no. 8, pp. 56–60, Aug. 2020.

Issue

Section

Research Article