Cloud Data Security and Reliability using RSA and SHA-2 Algorithms - A Novel Approach

Authors

  • VeeraRaghavaRao Atukuri  Research Scholar, Department of Computer Science and Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India
  • Dr. Ramineni SivaRamaPrasad  Head of the Department, Department of Commerce and Business Administration, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India

Keywords:

Cloud Computing, Security, on demand

Abstract

Cloud computing is a latest and emerging technology in the current IT field. It is very useful technology which it can store the numerous of data in servers and can be accessed from anywhere in the world through Internet. Simply, on demand we can access the resources from Internet at anytime and anywhere. It is the latest architecture of IT industry. It works on the software and large databases where the services are not fully trusted. This poses many security challenges, which have not been well defined and worked. In this paper, we develop a system with strong benefits and strong securities. So whenever a customer storing his data on cloud server he is not worry about his data. The system is developed with a mechanism, which is highly trustworthy in placing the user data in to cloud server and retrieving, by the cloud user.

References

  1. C.Wang.K.Ren and J.Wang, “Secure and practical outsourcing of linear programming in cloud computing”, IEEE Transaction on cloud computing. Pp.820-828, 2011.
  2. C.Wang.Q.Wang.K.Ren and W.Lou, “Ensuring data storage security in cloud computing” in Proc.of IWQoS’09,July 2009
  3. S.Hohenberger and A.Lysyanskaya, “How to securely outsource cryptographic computations”, in Proc.of TCC, 2005, pp 264-282
  4. R.Gennaro, C.Gentry and B.Parno, “Non-Interactive verifiable computing : outsourcing computation in entrusted workers” in Proc. of Cryto’10,Aug 2010.
  5. M.Atallah and K.Frikken, “Securely outsourcing linear algebra computations” in Proc.of ASIACCS, 2010. pp 48-59
  6. N.Gohring, “Amazon’s S3 down for several hours”, “amazonwebservices (AWS)”
  7. Sun Micro Systems Inc, “Building customer trust in cloud computing with transparent security” 2009.
  8. M.J.AtallahK.N.Pantazopoulos, J.R.Riece and E.H Spafford, “Secure outsourcing of scientific computations”, advances in computers,vol.54, pp 216-272,2001.
  9. M.J.Atallah and J.Li.”Secure outsourcing of sequence comparisons” int. J.inf.sec.vol.4.no4.pp 277-287,2005
  10. D.Benjamin and M.J.Atallah “Private and cheating free outsourcing of algebraic computations” in proc.of 6th conference on privacy security and trust (pst),2008,pp 240-245
  11. A C C Yao, “Protocols for secure computations” in proc of FOCS’82 1982 pp 160-164.
  12. O.Goldreich, S.Micali and A.Wigderson “How to play any mental game or a completeness theorem for protocols with honest majority” in proc. of STOC’87 1987,pp 218- 229.
  13. W.Du and M.J.Atallah, “secure multi-party computation problems and their applications: a review and open problems” , in proc.of New security paradigms workshop (NSPW), 2001 pp.13-22
  14. SujayP.Pawar and U.M.Patil“Secure Data Outsourcing in Cloud” in ICACCE’2014 29-33.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
VeeraRaghavaRao Atukuri, Dr. Ramineni SivaRamaPrasad, " Cloud Data Security and Reliability using RSA and SHA-2 Algorithms - A Novel Approach, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1775-1781, January-February-2018.