Improved Key Generation Scheme of RSA (IKGSR) Algorithm Based on Offline Storage for Cloud

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 645)

Abstract

Cloud computing is the most prominently used technology to store and recover information from anyplace with the assistance of web. One of the challenging tasks is to provide security to client information stored in cloud. To enhance the security of clients information, in this paper, (IKGSR) an improved key generation scheme for RSA algorithm is introduced which employs four giant prime numbers to create encoding (E) and decoding (D) keys. A database schema is also designed to save the key elements of RSA before it initiates.

Keywords

Cloud security Indexes Offline storage RSA algorithm Key generation Cloud storage 

References

  1. 1.
    Mell, P.M., Grance, T.: SP 800-145, the NIST definition of cloud computing. Technical report, NIST, Gaithersburg, MD, United States (2011)Google Scholar
  2. 2.
    Buchade, A.R., Ingle, R.: Key management for cloud data storage: methods and comparisons. In: Fourth International Conference on Advanced Computing and Communications Technologies, pp. 263–270 (2014)Google Scholar
  3. 3.
    Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. (2015).  https://doi.org/10.1016/j.ins.2015.01.025
  4. 4.
    Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn, p. 121e44, 253e97. Pearson Education (2011)Google Scholar
  5. 5.
    Jamgekar, R.S., Joshi, G.S.: File encryption and decryption using secure RSA. Int. J. Emerg. Sci. Eng. 1, 11–14 (2013)Google Scholar
  6. 6.
    Somani, N., Mangal, D.: An improved RSA cryptographic system. Int. J. Comput. Appl. 105, 16 (2014)Google Scholar
  7. 7.
    Patidar, R., Bhartiya, R.: Modified RSA cryptosystem based on offline storage and prime number. In: IEEE International Conference on Computing Intelligence and Computing Research, pp. 1–6 (2013)Google Scholar
  8. 8.
    Abd, S.K., Al-Haddad, S.A.R., Hashim, F., Abdullah, A.: A review of cloud security based on cryptographic mechanisms. In: International Symposium on Biometrices and Security Technologies (ISBAST), pp. 106–111 (2014)Google Scholar
  9. 9.
    Song, N., Chen, Y.: Novel hyper-combined public key based cloud storage key management scheme. China Commun. 11, 185–194 (2014)Google Scholar
  10. 10.
    Thangavel, M., Varalakshmi, P., Murrali, M., Nithya, K.: An enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. 20, 3–10 (2015)Google Scholar
  11. 11.
    Luy, E., Karatas, Z.Y., Ergin, H.: Comment on an enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. (2016)Google Scholar
  12. 12.
    Wagner, N.R.: The laws of cryptography with java code. Technical report, pp. 78–112 (2003)Google Scholar
  13. 13.
    Bishop, D.: Introduction to cryptography with java applets, pp. 237–250 (2003)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Kalasalingam UniversityKrishnankoil, SrivilliputturIndia

Personalised recommendations