Security and Privacy of Sensitive Data in Cloud Computing Using RSA
DOI:
https://doi.org/10.32628/IJSRST2182108Keywords:
Cloud Computing, Security, Advanced Encryption Standards (AES), Rivest–Shamir–Adleman(RSA), Heroku cloud.Abstract
Today's world internet is being used by almost everyone. Numerous file exchanges take place online including many official documents. These files require some sort of security mechanisms while being transmitted over the Internet. Technology has done a great deal for changing the way we live and do business today. In the fast-moving world we need something essential for fast computation. Along with the popular use of computer, Information security has also become one of the problems which need to be solved. Many security issues like the malware authors, information leakage, endangerment and unauthorized exploitation need to be taken into account. To control those issues, crypto-security is necessary. More Applications started to use Rivest–Shamir–Adleman (RSA). However, Since RSA on large blocks is computationally intensive and largely byte-parallel. System will parallel perform the encryption and decryption process in a distributed environment and the performance analysis shows improvement in terms of execution time and provides the security.
References
- Dr. P.Sivakumar, M. NandhaKumar, R.Jayaraj and A.Sakthi Kumaran, “ Securing Data and Reducing the Time Traffic Using AES Encryption with Dual Cloud“, Secur. Enhanc. Data Migr. Cloud, vol. 9,no. 23,pp.1-13,2019.
- Cong Wang and Qian Wang," Privacy Preserving and Batch Auditing in Service Cloud Data Storage “, in Future Generation Communication Technologies (FGCT),pp. 55-59,2015.
- L.Kacha and AbdelhafiZitouni," An overview on Data Security in Cloud Computing“, Int. J.RecentInnov. Trends Comput. Commum., vol. 5,no.4,pp. 194- 200,2017.
- S.Kumari,Princy,Reema"Security in cloud computing using AES and DES,"Int. J.RecentInnov. Trends Comput. Commun.,vol.5,no.4,pp194-200, 2017.
- D.Meng," Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing“, in IT Convergence and Security(ICITCS),International Conference on, pp.1-7,2013.
- J.R.NSighom,P.Zhang, and L.You,"Secure and efficient privacy preserving public auditing scheme for cloud Storage",Secur. Enhane.DataMigr. Cloud, vol. 9,no.23,pp.1- 13,2017.
- A.Singh,P.Gupta,;R.Lonare,RahulKrSharma,N.A.Ghodichor,"Toward Secure and Dependable Storage in Cloud Coumputing,"Int j.Emerg. Trends Eng.Manag. Res., vol.3,no. 2,pp 1-5,2017.
- Dr.P.Sivakumar, M. NandhaKumar , R.Jayaraj and A.Sakthi Kumaran, “ Securing Data and Reducing the Time Traffic Using AES Encryption with Dual Cloud“, Secur. Enhanc. Data Migr. Cloud, vol. 9, no. 23, pp.1-13, 2019.
- M.Usman and U.Akram,"A novel Efficient Remote Data Possession Checking Protocol in cloud storage," in IT Convergence and security (ICITCS),2014 International Conference on,pp,1-7,2014.
- D.Zissis and D.Lekkas, "Privacy Preserving in Secure Cloud Data Storage“, 2012.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.