Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm

被引:0
|
作者
Mahalle, Vishwanath S. [1 ]
Shahade, Aniket K. [2 ]
机构
[1] Shri Sant Gajanan Maharaj Coll Engn, Dept Comp Sci & Engn, Shegaon, Maharashtra, India
[2] Shri Sant Gajanan Maharaj Coll Engn, Dept Informat Technol, Shegaon, Maharashtra, India
来源
2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC) | 2014年
关键词
Cloud; RSA Algorithm; AES Algorithm; Key Generation; Private key; Public key; Secret key; Authentication; Encryption; Decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents Hybrid (RSA & AES) encryption algorithm to safeguard data security in Cloud. Security being the most important factor in cloud computing has to be dealt with great precautions. This paper mainly focuses on the following key tasks: 1. Secure Upload of data on cloud such that even the administrator is unaware of the contents. 2. Secure Download of data in such a way that the integrity of data is maintained. 3. Proper usage and sharing of the public, private and secret keys involved for encryption and decryption. The use of a single key for both encryption and decryption is very prone to malicious attacks. But in hybrid algorithm, this problem is solved by the use of three separate keys each for encryption as well as decryption. Out of the three keys one is the public key, which is made available to all, the second one is the private key which lies only with the user. In this way, both the secure upload as well as secure download of the data is facilitated using the two respective keys. Also, the key generation technique used in this paper is unique in its own way. This has helped in avoiding any chances of repeated or redundant key.
引用
收藏
页码:146 / 149
页数:4
相关论文
共 50 条
  • [42] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629
  • [43] SECURITY MODEL BASED ENCRYPTION TO PROTECT DATA ON CLOUD
    Ghebghoub, Yasmina
    Boussaid, Omar
    Oukid, Saliha
    PROCEEDINGS OF INTERNATIONAL CONFERENCE INFORMATION SYSTEMS AND DESIGN OF COMMUNICATION (ISDOC2014), 2014, : 50 - 55
  • [44] Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques
    Pant, Vinay Kumar
    Prakash, Jyoti
    Asthana, Amit
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 490 - 494
  • [45] Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance
    Pattanavichai, Santi
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 475 - 481
  • [46] The IC card data encryption research based on the AES algorithm
    Yu, Yang
    Wang, Shimin
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2698 - +
  • [47] A Modified AES-512 Bits Algorithm for Data Encryption
    Bempah, Kwame Owusu
    Gyamfi, Kwasi Baah
    Boateng, Francis Ohene
    Owusu-Mensah, Isaac
    EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2024, 17 (02): : 979 - 995
  • [48] Enhancement of Security Mechanism for Confidential Data using AES-128, 192 and 256bit Encryption in Cloud
    Raj, Gaurav
    Kesireddi, Ram Charan
    Gupta, Shruti
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 374 - 378
  • [49] Enhancing Data Security in Cloud Using Blockchain
    Yadav, Dhananjay
    Shinde, Aditi
    Nair, Akash
    Patil, Yamini
    Kanchan, Sneha
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 753 - 757
  • [50] Enhancing Data Security of Cloud Based LMS
    Chatterjee, Paramita
    Bose, Rajesh
    Banerjee, Subhasish
    Roy, Sandip
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 1123 - 1139