Abstract
The primary operation performed by cloud computing is to provide dynamic storage capacity and security to its users. The main benefit from using the cloud computing is the reduction in the economic expenditure and ease in the accessibility of data. This whole mechanism involves various security algorithms; still there are some security issues which needs to be solved. In this paper, various security algorithms have been discussed in order to analyze the performance of the algorithms and to find out that which encryption algorithm is better for the data protection in the cloud computing platform. The mainly concerned algorithms in this paper are RSA Algorithm and Modification in RSA Encryption Algorithm (MREA). One of the modifications in RSA encryption algorithm is named as Homomorphic Encryption Algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hemanth, P.N., Raj, N.A., Yadav, N.: Secure data transfer by implementing mixed algorithms. In: Recent findings in intelligent computing techniques, pp. 79–85. Springer, Singapore (2019)
Intila, C., Gerardo, B., Medina, R.: A study of public key ‘e’ in RSA algorithm. In: IOP Conference Series: Materials Science and Engineering, vol. 482, no. 1, p. 012016. IOP Publishing (2019)
Degadwala, D., Mer, U., Modi, N.: A novel security approach for data migration using ECC & MAES algorithms. Utsav and Modi, Nimit, A Novel Security Approach for Data Migration using ECC & MAES Algorithms, 9 August 2019 (2019)
Akhter, S., Chowdhury, M.B.: Bangla and English text cryptography based on modified blowfish and Lempel-Ziv-Welch algorithm to minimize execution time. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp. 96–101. IEEE (2019)
Deshpande, V., Das, D.: Efficient searching over encrypted database: methodology and algorithms. In: International Conference on Distributed Computing and Internet Technology, pp. 327–338. Springer, Cham (2019)
Kannan, M., Priya, C., Vaishnavi, S.: A comparative analysis of DES, AES and RSA crypt algorithms for network security in cloud computing (2019)
Sai, M.K., Reddy, P.L., Krishna, R., Siva, N., Teja, R., Prakash, K.B.: Hybrid encryption for medical applications using advanced algorithms in internet of things. Indian J. Public Health Res. Dev. 10(6) (2019)
Mahmood, G.S., Huang, D.J., Jaleel, B.A.: Achieving an effective, confidentiality and integrity of data in cloud computing. IJ Netw. Secur. 21(2), 326–332 (2019)
Thewar, P., Tiwari, A., Shah, P., Desai, C.: CARS: a hybrid security approach to secure cloud data through mobile devices (2019). SSRN 3370126
Zhang, F., Chen, Y., Meng, W., Wu, Q.: Hybrid encryption algorithms for medical data storage security in cloud database. Int. J. Database Manage. Syst. (IJDMS) 11 (2019)
Mahmood, G.S., Huang, D.J., Jaleel, B.A.: A Secure cloud computing system by using encryption and access control model. J. Inform. Process. Syst. 15(3) (2019)
Khan, S.A., Aggarwal, R.K., Kulkarni, S.: Enhanced homomorphic encryption scheme with PSO for encryption of cloud data. In: 2019 5th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 395–400. IEEE (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Shaheen, B., Siddiqui, F. (2020). Comparison Between RSA Algorithm and Modified RSA Algorithm Used in Cloud Computing. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-33846-6_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33845-9
Online ISBN: 978-3-030-33846-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)