Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm

被引:0
|
作者
Mahalle, Vishwanath S. [1 ]
Shahade, Aniket K. [2 ]
机构
[1] Shri Sant Gajanan Maharaj Coll Engn, Dept Comp Sci & Engn, Shegaon, Maharashtra, India
[2] Shri Sant Gajanan Maharaj Coll Engn, Dept Informat Technol, Shegaon, Maharashtra, India
来源
2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC) | 2014年
关键词
Cloud; RSA Algorithm; AES Algorithm; Key Generation; Private key; Public key; Secret key; Authentication; Encryption; Decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents Hybrid (RSA & AES) encryption algorithm to safeguard data security in Cloud. Security being the most important factor in cloud computing has to be dealt with great precautions. This paper mainly focuses on the following key tasks: 1. Secure Upload of data on cloud such that even the administrator is unaware of the contents. 2. Secure Download of data in such a way that the integrity of data is maintained. 3. Proper usage and sharing of the public, private and secret keys involved for encryption and decryption. The use of a single key for both encryption and decryption is very prone to malicious attacks. But in hybrid algorithm, this problem is solved by the use of three separate keys each for encryption as well as decryption. Out of the three keys one is the public key, which is made available to all, the second one is the private key which lies only with the user. In this way, both the secure upload as well as secure download of the data is facilitated using the two respective keys. Also, the key generation technique used in this paper is unique in its own way. This has helped in avoiding any chances of repeated or redundant key.
引用
收藏
页码:146 / 149
页数:4
相关论文
共 50 条
  • [31] Improving cloud data security through hybrid verification technique based on biometrics and encryption system
    Hossain M.A.
    Al Hasan M.A.
    International Journal of Computers and Applications, 2022, 44 (05) : 455 - 464
  • [32] Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach
    Kumar, Pawan
    Kumar Bhatt, Ashutosh
    IET COMMUNICATIONS, 2020, 14 (18) : 3212 - 3222
  • [33] Implemetation of RSA Algorithm for Speech Data Encryption and Decryption
    Rahman, Md. Mijanur
    Saha, Tushar Kanti
    Bhuiyan, Md. Al-Amin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (03): : 74 - 82
  • [34] Analysis of Novel Hybrid Encryption Algorithm for Providing Security in Big Data
    Dwivedi, Nikhil
    Malik, Arun
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2019, PT II, 2019, 1076 : 158 - 169
  • [35] Substation Communication security Research Based on Hybrid Encryption of DES and RSA
    Wang Fangfang
    Wang Huazhong
    Chen Dongqing
    Peng Yong
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 437 - 441
  • [36] A New Approach for Enhancing AES-Based Data Encryption Using ECC
    Sherali, Fairouz
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2024, 19 (01) : 229 - 235
  • [37] Encryption as a Service for Data Healthcare Cloud Security
    El Bouchti, Abdelali
    Bahsani, Samir
    Nahhal, Tank
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 48 - 54
  • [38] Enhancing Data Retrieval Using Fuzzy Keywords and Data Security Using Feistal Encryption Algorithm
    Dhamija, Jalendu
    Rawat, Kaumudi
    Choudhury, Tanupriya
    Kumar, Praveen
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 257 - 262
  • [39] A Novel Data Encryption Algorithm To Ensure Database Security
    Ibrahim, Sivan
    Zengin, Ahmet
    Hizal, Selman
    Akhter, A. F. M. Suaib
    Altunkaya, Cevat
    ACTA INFOLOGICA, 2023, 7 (01): : 1 - 16
  • [40] Research of High-Efficiency Network Security for In-Vehicle Ethernet based on FPU-RSA Encryption Algorithm
    Wang, Jing-Ting
    Xu, Yi-Hu
    Wu, Yu-Jing
    Xu, Yi-Nan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 195 - 199