CFP last date
20 August 2024
Reseach Article

Enhancing Confidentiality and Integrity in Cloud Computing using RSA Encryption Standard and MD5 Hashing Algorithm

by Katende Nicholas, Cheruiyot Wilson, Ann Muthoni Kibe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 14
Year of Publication: 2018
Authors: Katende Nicholas, Cheruiyot Wilson, Ann Muthoni Kibe
10.5120/ijca2018917788

Katende Nicholas, Cheruiyot Wilson, Ann Muthoni Kibe . Enhancing Confidentiality and Integrity in Cloud Computing using RSA Encryption Standard and MD5 Hashing Algorithm. International Journal of Computer Applications. 181, 14 ( Sep 2018), 23-27. DOI=10.5120/ijca2018917788

@article{ 10.5120/ijca2018917788,
author = { Katende Nicholas, Cheruiyot Wilson, Ann Muthoni Kibe },
title = { Enhancing Confidentiality and Integrity in Cloud Computing using RSA Encryption Standard and MD5 Hashing Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2018 },
volume = { 181 },
number = { 14 },
month = { Sep },
year = { 2018 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number14/29890-2018917788/ },
doi = { 10.5120/ijca2018917788 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:05:58.111473+05:30
%A Katende Nicholas
%A Cheruiyot Wilson
%A Ann Muthoni Kibe
%T Enhancing Confidentiality and Integrity in Cloud Computing using RSA Encryption Standard and MD5 Hashing Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 14
%P 23-27
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has revolutionized how services are rendered and used by some many people in the world like providing hardware, software and infrastructural storage to many users at any time. This is in terms of software as a service, platform as a service and infrastructure as a service, hence providing room for convinience to the cloud consumers to choose what they want presently and catering for their future needs since its elastic. With the company’s or individual’s data held by a third party that is the cloud provider, it brings out the security issues in respose to confidentiality, availability and integrity of the data at the cloud provider’s side. In this reseach paper solution is provided to maintain confidentiality of data and integrity of data at the cloud provider’s side. This framework contains RSA encryption standard and MD5 hashing alogorithm. In this solution data is encrypted using RSA which generates both public and private keys used in the encryption and the decryption then using MD5 to generate the hash value which is stored before the data is sent to the cloud provider. The hash value is checked upon retriving of data from the cloud and if its still the same then the data was not modified or tempered with if else then the cloud provider has bleeched the contract. All these approaches undergo through the following steps Encryption, Hashing, Data uploading on a cloud, Verification and Decryption.

References
  1. P.Mell and T.Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology,Vol.53,no.6,p.50,2009. [Online]. Available: http://csrc.nist.gov/groups/SNS/cloud computing/clouddefv15.doc.
  2. NesrineKaaniche,AymenBoudguiga, Maryline Laurent, ”ID Based Cryptography for Secure Cloud Data Storage,”Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference .
  3. NehaTirthani, GanesanR,”Data Security in Cloud Architecture Based on diffie Hellman and Elliptical Curve Cryptography,” International Association for Cryptologic Research, Nov 2013.
  4. Priyanka Ora and Dr.P.R.Pal, “Data Security and Integrity in Cloud Computing Based On RSA Partial Homomorphic and MD5 Cryptography”, IEEE International Conference on Computer, Communication and Control (IC4-2015).
  5. Sudhansu Ranjan Lenka and Biswaranjan Nayak, “Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm”, International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 3, June-2014
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing RSA MD5