Key Generation Algorithm In Cloud Computing
17.12.2020 admin
- Mell, P.M., Grance, T.: SP 800-145, the NIST definition of cloud computing. Technical report, NIST, Gaithersburg, MD, United States (2011)Google Scholar
- Buchade, A.R., Ingle, R.: Key management for cloud data storage: methods and comparisons. In: Fourth International Conference on Advanced Computing and Communications Technologies, pp. 263–270 (2014)Google Scholar
- Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. (2015). https://doi.org/10.1016/j.ins.2015.01.025
- Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn, p. 121e44, 253e97. Pearson Education (2011)Google Scholar
- Jamgekar, R.S., Joshi, G.S.: File encryption and decryption using secure RSA. Int. J. Emerg. Sci. Eng. 1, 11–14 (2013)Google Scholar
- Somani, N., Mangal, D.: An improved RSA cryptographic system. Int. J. Comput. Appl. 105, 16 (2014)Google Scholar
- Patidar, R., Bhartiya, R.: Modified RSA cryptosystem based on offline storage and prime number. In: IEEE International Conference on Computing Intelligence and Computing Research, pp. 1–6 (2013)Google Scholar
- Abd, S.K., Al-Haddad, S.A.R., Hashim, F., Abdullah, A.: A review of cloud security based on cryptographic mechanisms. In: International Symposium on Biometrices and Security Technologies (ISBAST), pp. 106–111 (2014)Google Scholar
- Song, N., Chen, Y.: Novel hyper-combined public key based cloud storage key management scheme. China Commun. 11, 185–194 (2014)Google Scholar
- Thangavel, M., Varalakshmi, P., Murrali, M., Nithya, K.: An enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. 20, 3–10 (2015)Google Scholar
- Luy, E., Karatas, Z.Y., Ergin, H.: Comment on an enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. (2016)Google Scholar
- Wagner, N.R.: The laws of cryptography with java code. Technical report, pp. 78–112 (2003)Google Scholar
- Bishop, D.: Introduction to cryptography with java applets, pp. 237–250 (2003)Google Scholar
Key Generation Algorithm In Cloud Computing Science
Key Generation Algorithm In Cloud Computing Technology
Cloud storage by means of encryption and decryption process is obtained in this section. The proposed cryptographic technique in terms of algorithm is given in table 3.1, 3.2 and table 3.3 of key generation, encryption and decryption respectively. Table 1: Key Generation Process. Generate column based on primary key column mysql 3109. Input: File Byte ( B), Flag ( ), Attribute ( Attr) Output. Oct 11, 2016 Hossain, F.M. Tanvir (13-23513-1) Analysis of Security Algorithms in Cloud Computing Instructor: Shahrin Chowdhury 2. /ethereum-private-key-generator-with-balance.html. INTRODUCTION CHALLENGE DATA STORAGE & SECURITY IN CLOUDE COMPUTING Data Security Issues in Cloud Computing EXISTING ALGORITHM FOR SECURITY AES RSA Further development proposal CONCLUSION Index. RSA algorithm consists of Public Key and Private Key. Public Key is known to all cloud users, whereas Private-Key is known only to the user who originally owns the data. One of the challenging tasks is to provide security to client information stored in cloud. To enhance the security of clients information, in this paper, (IKGSR) an improved key generation scheme for RSA algorithm is introduced which employs four giant prime numbers to create encoding (E) and decoding (D) keys.