Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm

被引:0
|
作者
Mahalle, Vishwanath S. [1 ]
Shahade, Aniket K. [2 ]
机构
[1] Shri Sant Gajanan Maharaj Coll Engn, Dept Comp Sci & Engn, Shegaon, Maharashtra, India
[2] Shri Sant Gajanan Maharaj Coll Engn, Dept Informat Technol, Shegaon, Maharashtra, India
来源
2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC) | 2014年
关键词
Cloud; RSA Algorithm; AES Algorithm; Key Generation; Private key; Public key; Secret key; Authentication; Encryption; Decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents Hybrid (RSA & AES) encryption algorithm to safeguard data security in Cloud. Security being the most important factor in cloud computing has to be dealt with great precautions. This paper mainly focuses on the following key tasks: 1. Secure Upload of data on cloud such that even the administrator is unaware of the contents. 2. Secure Download of data in such a way that the integrity of data is maintained. 3. Proper usage and sharing of the public, private and secret keys involved for encryption and decryption. The use of a single key for both encryption and decryption is very prone to malicious attacks. But in hybrid algorithm, this problem is solved by the use of three separate keys each for encryption as well as decryption. Out of the three keys one is the public key, which is made available to all, the second one is the private key which lies only with the user. In this way, both the secure upload as well as secure download of the data is facilitated using the two respective keys. Also, the key generation technique used in this paper is unique in its own way. This has helped in avoiding any chances of repeated or redundant key.
引用
收藏
页码:146 / 149
页数:4
相关论文
共 50 条
  • [21] A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud
    Maddila, Suresh Kumar
    Vadlamani, Nagalakshmi
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2023, 22 (06)
  • [22] Data Encryption and Decryption Using RSA Algorithm in a Network Environment
    Goshwe, Nentawe Y.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (07): : 9 - 13
  • [23] Advanced Encryption Standard (AES) Security Enhancement using Hybrid Approach
    D'souza, Flevina Jonese
    Panchal, Dakshata
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 647 - 652
  • [24] Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme
    Singh, Abhishek
    Sharma, Shilpi
    EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 157 - 166
  • [25] Data Encryption and Decryption Using RSA Algorithm in a Network Environment
    Goshwe, Nentawe Y.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (05): : 82 - 86
  • [26] Information Encryption and Decryption Analysis, Vulnerabilities and Reliability Implementing the RSA Algorithm in Python']Python
    Rodriguez G, Rocio
    Castang M, Gerardo
    Vanegas, Carlos A.
    APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 391 - 404
  • [27] A hybrid hiding encryption algorithm (HHEA) for data communication security
    Shaar, M
    Saeb, M
    Badawi, U
    Elmessiery, M
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 476 - 478
  • [28] Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
    Cai, Huili
    Liu, Xiaofeng
    Cangelosi, Angelo
    2019 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2019), 2019, : 1453 - 1456
  • [29] Hybrid AES-ECC Model for the Security of Data over Cloud Storage
    Rehman, Saba
    Talat Bajwa, Nida
    Shah, Munam Ali
    Aseeri, Ahmad O.
    Anjum, Adeel
    ELECTRONICS, 2021, 10 (21)
  • [30] Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing
    Kumar, Anuj
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1529 - 1535