18Feb 2017

PERFORMANCE ANALYSIS OF MODIFIED RSA AND RSA HOMOMORPHIC ENCRYPTION SCHEME FOR CLOUD DATA SECURITY.

  • GVP College for Degree and PG courses, Rushikonda, Visakhapatnam-45.
  • GITAM University, Rushikonda, Visakhapatnam-45.
Crossref Cited-by Linking logo
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

Cloud computing plays an important role for storing large data. It is a large pool of easily and accessible virtualized resources. The major recourses are hardware, development platforms and services. Since the data is open, security of data is a major issue which has to be focused. To ensure the security of data in cloud environment, we propose a method called modified RSA (MRSA) algorithm along with homomorphic encryption. .Homomorphic Encryption enhances the security measures of un-trusted systems or applications. It converts the data into cipher text which is analyzed and worked with it as if it were still in its original form. It allows complex mathematical operations to be performed on encrypted data which does not compromise the process of encryption. This paper presents an effective analysis of RSA and a new modified RSA with Homomorphic operations. In the modified RSA (MRSA) encryption scheme clustering of prime numbers for the generation of keys for encryption and decryption is done which fastens the process of encryption. The weakness of RSA lies in the generation of Prime numbers. This is achieved by a new classification technique in modified RSA (MRSA). Hence, elimination of redundant messages is done on the same values of the product of two prime numbers by classifying the keys. Hence, Security is enhanced.


  1. Craig Gentry, A Fully Homomorphic Encryption Scheme,? http://crypto.stanford.edu/craig/craig-thesis.pdf.
  2. Understanding Homomorphic Encryption http://en.wikipedia.org/wiki/Homomorphic_encryption.
  3. Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan.
  4. A Fully Homomorphic Encryption Implementation on Cloud Computing Shashank Bajpai and Padmaja Srivastava? Cloud Computing Research Team, Center for Development of Advanced Computing [C-DAC], Hyderabad.
  5. Homomorphic Encryption Applied to the Cloud Computing Security Maha TEBAA, Sa?d EL HAJJI, Abdellatif EL GHAZI.
  6. Vic (J.R.) Winkler, ?Securing the Cloud, Cloud Computer Security, Techniques and Tactics?, Elsevier.
  7. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
  8. L. Rivest, A. Shamir and L. Adleman ?A method for obtaining digital signatures and public ? key cryptosystems? Communications of the ACM, vol. 21,pp. 120 - 126, 1978.
  9. Stallings ?Network and internetwork security: principles and practice? Prentice - Hall, Inc., 1995.
  10. Stallings ?Network security Essentials: Applications and Standards? Pearson Education India, 2000.
  11. Joshi, et al. ?Network Security? Morgan Kaufmann, 2008.
  12. Stallings ?Cryptography and network security vol. 2? prentice hall, 2003. K. Ming Leung , k-Nearest Neighbor Algorithm for Classification , POLYTECHNIC UNIVERSITY Department of Computer Science / Finance and Risk Engineering , 2007.
  13. C .Aayush ,and M . Srushti ," Modified RSA Algorithm: A Secure Approach ", CSDL HomeCCICN2011Computational Intelligence and Communication Networks, International Conference on 2011.
  14. Kuldeep, Kr.Rajesh,and C .Ritika , "Modified Prime Number Factorization Algorithm (MPFA) For RSA Public Key Encryption", International Journal of Soft Computing & Engineering 2012 .
  15. S. Dhakar, and P. Sharma, ?Modified RSA Encryption Algorithm (MREA)" , Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on , Page(s): 426 ? 429, 7-8 Jan. 2012 .
  16. A Modified RSA Algorithm for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Algorithm , Dr. Abdulameer K. Hussain ,Computer Science Department, Jerash University,Jerash, 00962-02, Jordan, IJISET , Vol. 2 Issue 1, January 2015.
  17. Performance Evaluation of RSA Algorithm in Cloud Computing Security, Asma Khatoon and Dr. Ataul Aziz Ikram, International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 12 No. 1 Nov. 2014, pp. 336-345 ? 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

[D. Chandravathi and P. V. Lakshmi. (2017); PERFORMANCE ANALYSIS OF MODIFIED RSA AND RSA HOMOMORPHIC ENCRYPTION SCHEME FOR CLOUD DATA SECURITY. Int. J. of Adv. Res. 5 (Feb). 275-281] (ISSN 2320-5407). www.journalijar.com


D.Chandravathi
GITAM University

DOI:


Article DOI: 10.21474/IJAR01/3144      
DOI URL: http://dx.doi.org/10.21474/IJAR01/3144