Open Access   Article Go Back

Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment

Rupal Yadav1 , Kaptan Singh2 , Amit Saxena3

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-8 , Page no. 56-60, Aug-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i8.5660

Online published on Aug 31, 2020

Copyright © Rupal Yadav, Kaptan Singh, Amit Saxena . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rupal Yadav, Kaptan Singh, Amit Saxena, “Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.8, pp.56-60, 2020.

MLA Style Citation: Rupal Yadav, Kaptan Singh, Amit Saxena "Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment." International Journal of Computer Sciences and Engineering 8.8 (2020): 56-60.

APA Style Citation: Rupal Yadav, Kaptan Singh, Amit Saxena, (2020). Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment. International Journal of Computer Sciences and Engineering, 8(8), 56-60.

BibTex Style Citation:
@article{Yadav_2020,
author = {Rupal Yadav, Kaptan Singh, Amit Saxena},
title = {Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2020},
volume = {8},
Issue = {8},
month = {8},
year = {2020},
issn = {2347-2693},
pages = {56-60},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5196},
doi = {https://doi.org/10.26438/ijcse/v8i8.5660}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i8.5660}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5196
TI - Hybrid Cryptographic Solution to Overcome Drawbacks of RSA in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Rupal Yadav, Kaptan Singh, Amit Saxena
PY - 2020
DA - 2020/08/31
PB - IJCSE, Indore, INDIA
SP - 56-60
IS - 8
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
232 378 downloads 154 downloads
  
  
           

Abstract

Cloud Computing is the technology, which is growing more and more in the area of information technology. It is a big platform to deliver services to user. It provides with the benefit of storage, configuration, resources and sharing and all this is possible in cloud environment. Data is outsourced by the owner to store it on cloud because they have to serve there user at every possible stage. Presented work establishes security approach to secure and enhance the security of data at every step. Purpose of proposed work is to prevent from intruders and attackers and from sniffing messages. Proposed work is implemented using hybrid system (RC6+AES) and MD5 to calculate integrity. Using essential measurements like integrity, confidentiality, encryption, authentication, and authorization security in achieved in presented work

Key-Words / Index Term

Data security; AES; RC6; MD5; cloud computing

References

[1] C Akshita Bhandari, Ashutosh Gupta, Debasis D, ?A framework for Data Security and Storage in Cloud Computing?, International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 1-7, 2016
[2] B. Samanthula,Y. Elmehdwi, G. Howser and S. Madria, ?A secure data sharing and query processing framework via federation of cloud computing?, Information Systems, vol. 48, pp. 196-212, 2015.
[3] B. Shereek, ?Improve Cloud Computing Security Using RSA Encryption WithFermats Little Theorem?, IOSR Journal of Engineering, vol. 4, no. 2, pp. 01-08, 2014.
[4] C. Y. Chen and J. F. Tu2, ?A Novel Cloud Computing Algorithm of Security and Privacy?, Hindawi Publishing Corporation: Mathematical Problems in Engineering, 2013.
[5] G. L. Prakash, M. Prateek and I. Singh, ?Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System?, International Journal Of Engineering And Computer Science, vol. 3, issue 4, pp. 5215-5223, April 2014.
[6] ChorB,GilboaN,Naor M, ?Private Information Retrieval by Keywords?, Report 98-03, Theory of Cryptography Library, 1998.
[7] Arora, Rachna, Anshu Parashar, ?Secure user data in cloud computing using encryption algorithms?, International Journal of Engineering Research and Applications, Vol. 3, pp.1922-1926, 2013.
[8] Wang, Cong, ?Privacy-preserving public auditing for secure cloud storage?, Computers, IEEE Transactions on Vol 62.2, pp 362-375, 2013.
[9] D. Zissis and D. Lekkas, ?Addressing cloud computing security issues?, Elsevier Journal of Future Generation Computer Systems, vol. 28, pp. 583-592, 2012.
[10] F. F. Moghaddam, M. T. Alrashdan and O. Karimi, ?A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments?, Journal of Advances in Computer Network, vol. 1, No. 3, Sep. 2013.