scholarly journals RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing

2012 ◽  
Vol 3 (1) ◽  
pp. 34-38 ◽  
Author(s):  
Abhishek Patial ◽  
Sunny Behal

Cloud computing presents IT organizations with a funda­mentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a core problem in cloud computing, there are some kind of solution that are provide some security with model, some technology. In this paper is attempt to secure data from unauthorized access, the Method of data security is RSA algorithm for providing data security by encrypting the given data based on the KEY combinations. And this data then can only be decrypted by authorized person by using his private key. For the same purpose Google application cloud has been implemented on IJCT Foundation, all data has of IJCT Foundation sifted to Google cloud and RSA security algorithm is implemented by us for secure data.

2014 ◽  
Vol 577 ◽  
pp. 860-864
Author(s):  
Liang Liu ◽  
Tian Yu Wo

With cloud computing systems becoming popular, it has been a hotspot to design a scalable, highly available and cost-effective data platform. This paper proposed such a data platform using MySQL DBMS blocks. For scalability, a three-level (system, super-cluster, cluster) architecture is applied, making it scalable to thousands of applications. For availability, we use asynchronous replication across geographically dispersed super clusters to provide disaster recovery, synchronous replication within a cluster to perform failure recovery and hot standby or even process pair mechanism for controllers to enhance fault tolerance. For resource utility, we design a novel load balancing strategy by exploiting the key property that the throughput requirement of web applications is flucatuated in a time period. Experiments with NLPIR dataset indicate that the system can scale to a large number of web applications and make good use of resources provided.


IJARCCE ◽  
2015 ◽  
Vol 4 (4) ◽  
pp. 647-650
Author(s):  
Dr.Srivenkatesh M. ◽  
Ms.Vanitha K.

JURTEKSI ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 1-10
Author(s):  
Sebastian Suhandinata ◽  
Reyhan Achmad Rizal ◽  
Dedy Ongky Wijaya ◽  
Prabhu Warren ◽  
Srinjiwi Srinjiwi

Abstract:Computer data security relies on preventing data theft from irresponsible parties by using cryptography method. Some cryptography algorithms have good and poor performance in encrypting and decrypting data depending on the key types. Therefore the purpose of this research is to measure the performance of the hybrid algorithm, consisting a symmetric keyBlowfish algorithm and an asymmetric key RSA algorithm, in encrypting and decrypting multiple types of data such as documents, photos, audios, and videos. The result is the performance of the hybrid algorithm is almost on par with Blowfish and provides a more secure data encryption and decryption by taking advantage of RSA algorithm. The average encryption performance of hybrid algorithm is 0.85s on document, 1.06s on photo, 3.38s on audio, and 15.56s on video. While the average decryption performance of hybrid algorithm is 1.01s on document, 1.38s on photo, 4.3s on audio, and 27.56s on video.            Keywords:Hybrid cryptography, Data security, Performance, Blowfish, RSA  Abstrak:Keamanan data komputer berhubungan dengan pencegahan dari pencurian data oleh pihak yang tidak bertanggung jawab, salah satu cara pengamanan data komputer yaitu dengan teknik kriptografi. Beberapa metode kriptografi memiliki performa yang baik dan buruk tergantung dengan tipe kuncinya. Maka dari itu, tujuan dari penelitian ini adalah mengukur tingkat kecepatan kriptografi hybrid, terdiri dari algoritma simetris Blowfish dan algoritma asimetris RSA, dengan beberapa tipe data seperti dokumen, foto, audio dan video. Hasil dari penelitian ini adalah algoritma hybrid memiliki performa yang tidak jauh berbeda dari algoritma Blowfish dan membuat proses enkripsi dan dekripsi data lebih aman dengan keunggulan dari algoritma RSA. Rata-rata kecepatan enkripsi algoritma hybrid untuk dokumen 0,85 detik, gambar 1,06 detik, audio 3,38 detik, dan video 15,56 detik. Sedangkan rata-rata kecepatan dekripsi algoritma hybrid untuk dokumen 1,01 detik, gambar 1,38 detik, audio 4,3 detik, dan video 27,56 detik. Kata kunci:Kriptografihybrid, Keamanan data, Performa, Blowfish, RSA 


2015 ◽  
Vol 14 (6) ◽  
pp. 5834-5839
Author(s):  
Nisha Nisha ◽  
Naseeb Singh

Cloud computing is a broad solution that delivers IT as a service. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authoritys request. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. In this paper the attempt to secure data from unauthorized access. The Method of data security is AES algorithm for providing data security by encrypting the given data based on the AES. It is based on a design principle known as a substitution-permutation network, and is fast in both Software and Hardware. The algorithms used in AES are so simple that they can be easily implemented using heap processors and a minimum amount of memory and this data then can only be decrypted by authorized person by using his private key.


Any type of digital information is called as data. In today's world, precarious data are growing and used in communication over internet. Hence, data security is most important factor for the internet users. The best solution is to use some cryptography algorithms which encrypts data in some cipher and transmit it over the internet and again decrypted to genuine data. Cryptography is eternal. The field of cryptography manages the technique for passing on information safely. The objective is to permit the expected recipients to get the message appropriately while interfere with snoopers from understanding the message. Key arrangement layout allows communicating parties to establish a mutual cipher key. The situation of present day of data security framework incorporates secrecy, legitimacy, trustworthiness, non-repudiation. This paper introduces a improved system for securing text-data communication benefiting the use of RSA algorithm. It is the public-key cryptosystem and is mainly used for secure data transmission[1].


2015 ◽  
Vol 15 (1) ◽  
pp. 46-54
Author(s):  
K. Govinda ◽  
E. Sathiyamoorthy

Abstract Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for data organization and query dispensation in the cloud is important for superior and extended uses of cloud based technologies. Cloud users can barely have the full benefits of cloud computing if we can ensure the real user’s privacy and his data security concerns this approach along with storing thin-skinned personal information in databases and software spread around the cloud. There are numerous service suppliers in WWW (World Wide Web), who can supply each service as a cloud. These cloud services will switch over data with a supplementary cloud, so that when the data is exchanged between the clouds, the problem of confidentiality revelation exists. So the privacy revelation problem concerning a person or a corporation is unavoidably open when releasing or data distributing in the cloud service. Confidentiality is a significant issue in any cloud computing environment. In this paper we propose and implement a mechanism to maintain privacy and secure data storage for group members or a community in cloud environment.


Sign in / Sign up

Export Citation Format

Share Document