24-06-2013, 04:56 PM
IMPLEMENTING RSA ENCRYPTION ALGORITHM TO ENHANCE THE DATA SECURITY OF CLOUD IN CLOUD COMPUTING
IMPLEMENTING RSA.docx (Size: 353.51 KB / Downloads: 51)
ABSTRACT
This work presents RSA encryption algorithm to safeguard data security in Cloud. Security being the most important factor in cloud computing has to be dealt with great precautions. In this work, we have focused on the following key tasks:
1. Secure Upload of data on cloud such that even the vendor is unaware of the contents.
2. Secure Download of data in such a way that the integrity of data is maintained.
3. Proper usage and sharing of the public and private keys involved for encryption and decryption.
The use of a single key for both encryption and decryption is very prone to malicious attacks. But in RSA, this problem is solved by the use of two separate keys one each for encryption as well as decryption. Out of the two keys one is the public key, which is made available to all and the second one is the private key which lies only with the user. In this way, both the secure upload as well as secure download of the data is facilitated using the two respective keys. Also, the key generation technique used in this paper is unique in its own way.
INTRODUCTION
Computer in its evolution form has been changed multiple times, as learned from its past events. From the beginning, mainframes were predicted to be the future of computing. Indeed mainframes and large scale machines were built and used, and in some circumstances they are used similarly today. The trend, however, turned from bigger and more expensive, to smaller and more affordable commodity PCs and servers which are tied together to construct the so called Cloud Computing System, denoted as Cloud in short, due to their same capability in providing services, say storage, computation, and management and so on.
Problem Statement
Encryption algorithms became much more complex to combat brute forcing. However, new issues arose. In symmetric key encryption, the recipient would also have to know the sender’s key in order to decode the message. If anyone intercepted this key, all of the messages would be compromised until we changed it. Even then, the interceptor could simply steal the key again. Therefore, even the most complex algorithms following this method were easily broken. But RSA Algorithm is a form of public key encryption. Public key encryption is a process where each user is given two keys, one of which is a public and seen by anyone who wishes to see it and one which is kept strictly private.
CONCLUSION
This study proposed an RSA encryption algorithm using 1024 bit RSA key for providing data security to the user in the Cloud. The biggest advantage it provides us is that the keys are generated randomly and so no intruder can even guess them thereby giving us increased security along with convenience. Private Key is only known to the user and therefore user’s private data is not accessible to anyone not even the Cloud’s Administrator. The main purpose behind using RSA encryption algorithm is that it provides two keys i.e. public key for encryption and private key for decryption. The data after uploading is stored in an encrypted form and can be only decrypted by the private key of the user. The main advantage of this is that data is very secure on the cloud. Thus its security is based on the fact that there is no efficient way to factor very large numbers. The main focus of work was to maintain the confidentiality of the data of the user which is supposed to be stored at some remote location in Cloud by a cloud vendor.