Comparison Between RSA Algorithm and Modified RSA Algorithm Used in Cloud Computing

  • Bushra ShaheenEmail author
  • Farheen Siddiqui
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)


The primary operation performed by cloud computing is to provide dynamic storage capacity and security to its users. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in the accessibility of data. This whole mechanism involves various security algorithms; still there are some security issues which needs to be solved. In this paper, various security algorithms have been discussed in order to analyze the performance of the algorithms and to find out that which encryption algorithm is better for the data protection in the cloud computing platform. The mainly concerned algorithms in this paper are RSA Algorithm and Modification in RSA Encryption Algorithm (MREA). One of the modifications in RSA encryption algorithm is named as Homomorphic Encryption Algorithm.


Cloud computing Data security Encryption algorithm RSA Modified RSA Encryption time Decryption time 


  1. 1.
    Hemanth, P.N., Raj, N.A., Yadav, N.: Secure data transfer by implementing mixed algorithms. In: Recent findings in intelligent computing techniques, pp. 79–85. Springer, Singapore (2019)Google Scholar
  2. 2.
    Intila, C., Gerardo, B., Medina, R.: A study of public key ‘e’ in RSA algorithm. In: IOP Conference Series: Materials Science and Engineering, vol. 482, no. 1, p. 012016. IOP Publishing (2019)Google Scholar
  3. 3.
    Degadwala, D., Mer, U., Modi, N.: A novel security approach for data migration using ECC & MAES algorithms. Utsav and Modi, Nimit, A Novel Security Approach for Data Migration using ECC & MAES Algorithms, 9 August 2019 (2019)Google Scholar
  4. 4.
    Akhter, S., Chowdhury, M.B.: Bangla and English text cryptography based on modified blowfish and Lempel-Ziv-Welch algorithm to minimize execution time. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp. 96–101. IEEE (2019)Google Scholar
  5. 5.
    Deshpande, V., Das, D.: Efficient searching over encrypted database: methodology and algorithms. In: International Conference on Distributed Computing and Internet Technology, pp. 327–338. Springer, Cham (2019)Google Scholar
  6. 6.
    Kannan, M., Priya, C., Vaishnavi, S.: A comparative analysis of DES, AES and RSA crypt algorithms for network security in cloud computing (2019)Google Scholar
  7. 7.
    Sai, M.K., Reddy, P.L., Krishna, R., Siva, N., Teja, R., Prakash, K.B.: Hybrid encryption for medical applications using advanced algorithms in internet of things. Indian J. Public Health Res. Dev. 10(6) (2019)Google Scholar
  8. 8.
    Mahmood, G.S., Huang, D.J., Jaleel, B.A.: Achieving an effective, confidentiality and integrity of data in cloud computing. IJ Netw. Secur. 21(2), 326–332 (2019)Google Scholar
  9. 9.
    Thewar, P., Tiwari, A., Shah, P., Desai, C.: CARS: a hybrid security approach to secure cloud data through mobile devices (2019). SSRN 3370126Google Scholar
  10. 10.
    Zhang, F., Chen, Y., Meng, W., Wu, Q.: Hybrid encryption algorithms for medical data storage security in cloud database. Int. J. Database Manage. Syst. (IJDMS) 11 (2019)Google Scholar
  11. 11.
    Mahmood, G.S., Huang, D.J., Jaleel, B.A.: A Secure cloud computing system by using encryption and access control model. J. Inform. Process. Syst. 15(3) (2019)Google Scholar
  12. 12.
    Khan, S.A., Aggarwal, R.K., Kulkarni, S.: Enhanced homomorphic encryption scheme with PSO for encryption of cloud data. In: 2019 5th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 395–400. IEEE (2019)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Jamia HamdardNew DelhiIndia

Personalised recommendations