Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud

被引:12
作者
Amalarethinam, D. I. George [1 ]
Leena, H. M. [2 ]
机构
[1] Jamal Mohamed Coll Autonomous, Tiruchirappalli 620020, India
[2] Holy Cross Coll Autonomous, Comp Sci, Tiruchirappalli 620002, India
来源
2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT) | 2017年
关键词
Cloud Computing; Data Security; RSA; Key size; Blocks;
D O I
10.1109/WCCCT.2016.50
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is a distributed and centralized network of inter connected and inter related systems with one or more IT resources provisioned based on pay-on-demand usage. Even though Cloud consumers or users are more flexible with cloud resources, there exist various issues which bring down the usage of cloud resources. Security issue is the major one among them. Data Security and Privacy, Identity and Access Management, Disaster Recovery/Business Continuity Planning etc., are some of the crisis related to data stored on the cloud. Since the cloud users are more concerned with their data, its security is a major issue which has to be dealt seriously. Securing the users' data can be achieved by the conventional method of Cryptography. Encryption is done by using any one of the popular symmetric or asymmetric key algorithms such as AES, DES, RSA, Blowfish and Triple DES etc., RSA algorithm which is a asymmetric key algorithm using two different keys for encryption and decryption processes. The Key size can be varied to make the encryption process strong. Hence it is difficult for the attackers to intrude dthe data. Increasing key size correspondingly increases the time taken for encryption and decryption process. The proposed algorithm reduces the time of encryption and decryption processes by dividing the file into blocks and enhances the strength of the algorithm by increasing the key size. This strength paves the way to store data in cloud by the users without any inconvenience.
引用
收藏
页码:172 / 175
页数:4
相关论文
共 18 条
  • [1] Abu-Dawas Motasem A, 2015, INT J COMPUTER INFOR, V4
  • [2] Dubey A.K., 2016, P 2016 22 NAT C COMM, P1, DOI DOI 10.1109/C0NSEG.2012.6349503
  • [3] Enhancing security in Cloud using Trusted Monitoring Framework
    Fera, M. Arun
    Manikandaprabhu, C.
    Natarajan, Ilakiya
    Brinda, K.
    Darathiprincy, R.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 198 - 203
  • [4] Gayathri Devi P, 2013, INT J INNOVATIVE RES, V2, P306
  • [5] George Amalarethinam D I, 2015, INDIAN J SCI TECHNOL, V8, P1
  • [6] George Amalarethinam D I, INT J CONTR IN PRESS
  • [7] Kahate A., 2010, CRYPTOGRAPHY NETWORK
  • [8] Khanezaei Nasrin, 2016, FRAMEWORK BASED RSA, P58, DOI [10.1109/ SPC.2014.7086230, DOI 10.1109/SPC.2014.7086230]
  • [9] Krutz Ronald L, 2010, CLOUD SECURITY COMPR
  • [10] Mahalle Vishwanath S, 2016, ENHANCING DATA SECUR, P146, DOI [10.1109/INPAC.2014.6981152, DOI 10.1109/INPAC.2014.6981152]