Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm

Cloud computing is the technology through which people can share resources, services and information among the people through use of internet. Since we share the data through the internet, security is considered as a major issue. In Cloud computing several security issues arises like confidentiality, integrity and authentication. In this paper a new security model have been proposed. The architecture provides a mechanism through which we can get secure communication as well as hiding the information from unauthorized users. In this model we have implemented a combination of RSA encryption and digital signature technique which can easily with all types of cloud computing features like: PaaS, SaaS and IaaS. This combination mechanism provides three way security i.e. data security, authentication and verification. In this paper, we have proposed RSA encryption algorithm for confidentiality of data and for authentication MD 5 algorithm have been implemented.

[1]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[2]  P. Sharma,et al.  Modified RSA Encryption Algorithm (MREA) , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[3]  Mladen A. Vouk,et al.  Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.

[4]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[5]  Yashpal Kadam Security Issues in Cloud Computing A Transparent View , 2011 .

[6]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[7]  Suli Wang,et al.  File Encryption and Decryption System Based on RSA Algorithm , 2011, 2011 International Conference on Computational and Information Sciences.

[8]  Marin Litoiu,et al.  Resource provisioning for cloud computing , 2009, CASCON.

[9]  Tong Wang,et al.  Recent Advances in Cloud Security , 2011, J. Comput..

[10]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .

[11]  Eng-Thiam Yeoh,et al.  Comparison of ECC and RSA algorithm in multipurpose smart card application , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[12]  K. B. Raja,et al.  Performance analysis of RSA and ECC in identity-based authenticated new multiparty key agreement protocol , 2012, 2012 International Conference on Computing, Communication and Applications.

[13]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[14]  Guy Ngongang Cloud Computing Security , 2011 .

[15]  Gunasekar Kumar,et al.  Analysis of Security Issues in Cloud Based E-Learning , 2012 .

[16]  A. Sadeghi,et al.  Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.