A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing

被引:7
作者
Pitchay, Sakinah Ali [1 ]
Alhiagem, Wail Abdo Ali [1 ]
Ridzuan, Farida [1 ]
Saudi, Madihah Mohd [1 ]
机构
[1] Univ Sains Islam Malaysia USIM, Fac Sci & Technol, Bandar Baru Nilai, Nilai, Malaysia
来源
2015 17TH UKSIM-AMSS INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM) | 2015年
关键词
cloud computing security; encryption; decryption; RS; AES; cloud storage; cloud server;
D O I
10.1109/UKSim.2015.74
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Individual user and organizations benefit from cloud computing services, which allow permanent online storage of files. The problem occurs when companies store highly confidential documents in cloud servers. Therefore, this paper aims to introduce a backbone structure for a cloud storage system where the security and personal privacy is highly maximized. It is very obvious that cloud computing servers are highly protected against unauthorized access, but in some cases these files stored can be accessible by the maintenance staffs. Fully protection is needed to ensure that the files stored in the server are only accessible to owners. This paper proposes a system that will employ Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES) combination encryption process using USB device. The files may be accessed in the cloud but all the files will remain encrypted till the USB device is plugged into the computer. The point of applying such method is to fully protect the files and avoid using one single password. The randomly generated passkeys are very complex combinations thus user will not be able to fully memorize them. The proposed system will detect the USB that contains the private-key used for the files to be downloaded from the cloud.
引用
收藏
页码:201 / 205
页数:5
相关论文
共 12 条
[1]  
Al-Nabhani, 2010, J COMPUTING, V2, P152
[2]  
Gonsai D.A. M., 2014, Int. Journal of Computer Trends and Technology, V11, P7
[3]   An analysis of security issues for cloud computing [J].
Hashizume, Keiko ;
Rosado, David G. ;
Fernandez-Medina, Eduardo ;
Fernandez, Eduardo B. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) :1-13
[4]  
Kerby F., 2011, MONTHLY SECURITY AWA
[5]  
Milanov Evgeny, 2009, THE RSA ALGORITHM, P1
[6]  
Pagadala P.K., 2014, INT J INNOVATIVE RES, V1, P195
[7]  
Rittinghouse J.W., 2009, CLOUD COMPUTING IMPL
[8]  
Strickland J., 2011, CLOUD COMPUTING WORK
[9]   A survey on security issues in service delivery models of cloud computing [J].
Subashini, S. ;
Kavitha, V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :1-11
[10]  
Te-Shun Chou, 2013, International Journal of Computer Science & Information Technology, V5, P79, DOI 10.5121/ijcsit.2013.5306