Improved secure RSA cryptosystem for data confidentiality in cloud

被引:0
作者
Thangavel M. [1 ]
Varalakshmi P. [2 ]
机构
[1] Department of Information Technology, Thiagarajar College of Engineering, Madurai, 625015, Tamilnadu
[2] Department of Computer Technology, Madras Institute of Technology, Anna University, Chennai, 600-044, Tamilnadu
来源
Thangavel, M. (thangavelmuruganme@gmail.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 09期
关键词
Cloud computing; Cryptanalysis; Cryptography; Data confidentiality; Data outsourcing; Data security; Decryption; Encryption; Key exchange; Public key cryptosystem; RSA;
D O I
10.1504/IJISCM.2017.091269
中图分类号
学科分类号
摘要
Technologies like cloud computing provide a generous storage service to outsource the business and personal data. The major research challenge of data outsourcing is ensuring data confidentiality. Public key cryptography (PKC) is used in an open networking environment like the internet, for secure communication without depending on a secure channel, even for key exchange. One of the common and well known PKC is RSA cryptosystem. In this paper, an improved secure RSA cryptosystem (ISRSAC) has been proposed to increase the complexity in factorising the value of modulus 'n'. In ISRSAC, due to the complexity of computation in 'n', it is computationally difficult to factorise and perform cryptanalysis. A comparison is done with RSA, MREA and ESRKGS cryptosystems to show that ISRSAC is efficient. The experimental results prove that ISRSAC consumes more time for cryptanalysis compared to ESRKGS, MREA and RSA cryptosystems and provides security for data outsourcing in the cloud. Copyright © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:261 / 277
页数:16
相关论文
共 29 条
  • [1] Abudin J., Keot S.K., Malakar G., Borah N.M., Rahman M., Modified RSA public key cryptosystem using two key pairs, International Journal of Computer Science and Information Technologies, 5, 3, pp. 3548-3550, (2014)
  • [2] Al-Hamami A.H., Aldariseh I.A., Enhanced method for RSA cryptosystem algorithm, International Conference on Advanced Computer Science Applications and Technologies, pp. 402-408, (2012)
  • [3] Arora P.S., Enhancing cryptographic security using novel approach based on enhanced-RSA and Elamal: Analysis and comparison, International Journal of Computer Application, 112, 13, pp. 35-38, (2015)
  • [4] Ayele A.A., Sreenivasarao V., A modified RSA encryption technique based on multiple public keys, International Journal of Innovative Research in Computer and Communication Engineering, 1, 4, pp. 859-864, (2013)
  • [5] Choudhary N.P.V., Enhanced RSA cryptosystem based on three prime numbers, International Journal of Innovative Science, Engineering & Technology, 1, 10, pp. 753-757, (2014)
  • [6] Dhakar R.S., Gupta A.K., Sharma P., Modified RSA encryption algorithm (MREA), Second International Conference on Advanced Computing & Communication Technologies, pp. 426-429, (2012)
  • [7] Gangboir Y., Shende P., Modified RSA encryption algorithm is used in cloud computing for data security, International Journal of Advanced Technology in Engineering and Science, 3-6, pp. 207-215, (2015)
  • [8] Garfinkel S.L., An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS, pp. 1-15, (2007)
  • [9] Gennaro R., Randomness in cryptography, IEEE Security & Privacy, 4, 2, pp. 64-67, (2006)
  • [10] Ivy B.P.U., Mandiwa P., Kumar M., A modified RSA cryptosystem based on 'n' prime numbers, International Journal of Engineering and Computer Science, 1, 2, pp. 63-66, (2012)