scispace - formally typeset
Proceedings ArticleDOI

Secure algorithm for cloud computing and its applications

TLDR
The proposed schema presents HE-RSA or hybrid encryption RSA along with Advanced Encryption Standard or AES to ensure efficiency, consistency and trustworthiness in cloud servers.
Abstract
Cloud computing is a rising technology that is still unclear to many security issues. The most challenging issue today in cloud servers is to ensure data security and privacy of the users. The proposed schema presents HE-RSA or hybrid encryption RSA along with Advanced Encryption Standard or AES to ensure efficiency, consistency and trustworthiness in cloud servers. The goal of this paper is to use various cryptography concepts during communication along with its application in cloud computing and to enhance the security of ciphertext or encrypted data in cloud servers along with minimizing the consumption of time, cost and memory size during encryption and decryption.

read more

Citations
More filters
Journal Article

Secure integration of asymmetric and symmetric encryption schemes

TL;DR: This conversion is the first generic transformation from an arbitrary one-way asymmetricryption scheme to a chosen-ciphertext secure asymmetric encryption scheme in the random oracle model.
Journal ArticleDOI

Security Algorithms in Cloud Computing

TL;DR: Diverse calculations will be examined for security of information in distributed computing for cloud computing services.
Proceedings ArticleDOI

A Survey on Data Confidentiality and Privacy in Cloud Computing

TL;DR: This survey presents a review of the three essential data security attributes in the context of Cloud computing, namely, availability, integrity and confidentiality.
Journal ArticleDOI

Hybrid cryptographic approach for internet of things applications: a review

TL;DR: It can be concluded that the hybrid cryptographic approach has been implemented in many IoT cloud computing services and AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes.

Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing.

TL;DR: This paper proposes a new cloud scheme to enhance data security, thereby addressing the aforementioned issue whilst achieving a secure cloud storage service and dependability.
References
More filters
Journal ArticleDOI

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

TL;DR: This paper proposes a versatile primitive referred to as conditional identity-based broadcast PRE (CIBPRE) and formalizes its semantic security and shows an application of the CIBPRE to secure cloud email system advantageous over existing secure email systems based on Pretty Good Privacy protocol or identity- based encryption.
Proceedings ArticleDOI

SecCloud: Bridging Secure Storage and Computation in Cloud

TL;DR: This paper proposes SecCloud, a novel auditing scheme to secure cloud computing based on probabilistic sampling technique as well as designated verifier technique, which aims to consider secure data storage, computation and privacy preserving together.
Journal ArticleDOI

A security framework in G-Hadoop for big data computing across distributed Cloud data centres

TL;DR: This work proposes a new security model for G-Hadoop, based on several security solutions such as public key cryptography and the SSL protocol, that simplifies the users authentication and job submission process of the current G- Hadoop implementation with a single-sign-on approach.
Journal ArticleDOI

Dual RSA and Its Security Analysis

TL;DR: New variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys.
Book ChapterDOI

Universal Padding Schemes for RSA

TL;DR: It is shown that PSS can also be used for encryption, and gives an encryption scheme semantically secure against adaptive chosen-ciphertext attacks, in the random oracle model, and allows to safely use the same RSA key-pairs for both encryption and signature, in a concurrent manner.
Related Papers (5)