Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment
DOI:
https://doi.org/10.26438/ijcse/v8i8.5660Keywords:
Data security, AES, RC6, MD5, cloud computingAbstract
Cloud Computing is the technology, which is growing more and more in the area of information technology. It is a big platform to deliver services to user. It provides with the benefit of storage, configuration, resources and sharing and all this is possible in cloud environment. Data is outsourced by the owner to store it on cloud because they have to serve there user at every possible stage. Presented work establishes security approach to secure and enhance the security of data at every step. Purpose of proposed work is to prevent from intruders and attackers and from sniffing messages. Proposed work is implemented using hybrid system (RC6+AES) and MD5 to calculate integrity. Using essential measurements like integrity, confidentiality, encryption, authentication, and authorization security in achieved in presented work.
References
[1] C Akshita Bhandari, Ashutosh Gupta, Debasis D, "A framework for Data Security and Storage in Cloud Computing", International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 1-7, 2016
[2] B. Samanthula,Y. Elmehdwi, G. Howser and S. Madria, "A secure data sharing and query processing framework via federation of cloud computing", Information Systems, vol. 48, pp. 196-212, 2015.
[3] B. Shereek, "Improve Cloud Computing Security Using RSA Encryption WithFermats Little Theorem", IOSR Journal of Engineering, vol. 4, no. 2, pp. 01-08, 2014.
[4] C. Y. Chen and J. F. Tu2, "A Novel Cloud Computing Algorithm of Security and Privacy", Hindawi Publishing Corporation: Mathematical Problems in Engineering, 2013.
[5] G. L. Prakash, M. Prateek and I. Singh, "Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System", International Journal Of Engineering And Computer Science, vol. 3, issue 4, pp. 5215-5223, April 2014.
[6] ChorB,GilboaN,Naor M, "Private Information Retrieval by Keywords", Report 98-03, Theory of Cryptography Library, 1998.
[7] Arora, Rachna, Anshu Parashar, "Secure user data in cloud computing using encryption algorithms", International Journal of Engineering Research and Applications, Vol. 3, pp.1922-1926, 2013.
[8] Wang, Cong, "Privacy-preserving public auditing for secure cloud storage", Computers, IEEE Transactions on Vol 62.2, pp 362-375, 2013.
[9] D. Zissis and D. Lekkas, "Addressing cloud computing security issues", Elsevier Journal of Future Generation Computer Systems, vol. 28, pp. 583-592, 2012.
[10] F. F. Moghaddam, M. T. Alrashdan and O. Karimi, "A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments", Journal of Advances in Computer Network, vol. 1, No. 3, Sep. 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
