References
[1]. Aboud, S. J., AL-Fayoumi, M. A., Al-Fayoumi, M., &
Jabbar, H. S. (2008). An efficient RSA public key
encryption scheme. In Information Technology: New
Generations, 2008. ITNG 2008. Fifth International
Conference on (pp. 127-130). IEEE.
[2]. Al-Hamami, A. H., & Aldariseh, I. A. (2012). Enhanced
method for RSA cryptosystem algorithm. In Advanced
Computer Science Applications and Technologies
(ACSAT), 2012 International Conference on (pp. 402-
408). IEEE.
[3]. Ambedkar, B. R., Gupta, A., Gautam, P., & Bedi, S. S.
(2011). An efficient method to factorize the RSA public key
encryption. In Communication Systems and Network
Technologies (CSNT), 2011 International Conference on
(pp. 108-111). IEEE.
[4]. Bhandari, A., Gupta, A., & Das, D. (2016). Secure
algorithm for cloud computing and its applications. In
Cloud System and Big Data Engineering (Confluence),
th 2016 6 International Conference (pp. 188-192). IEEE.
[5]. Devkota, D., Ghimire, P., Burris, J., & Alkadi, I. (2015).
Comparison of security algorithms in cloud computing. In
Aerospace Conference, 2015 IEEE (pp. 1-7). IEEE.
[6]. Dongjiang, L., Yandan, W., & Hong, C. (2012). The
research on key generation in RSA public-key cryptosystem.
In Computational and Information Sciences (ICCIS), 2012
Fourth International Conference on (pp. 578-580). IEEE.
[7]. Goel, A. (2017). Encryption algorithm using dual
modulus. In Computational Intelligence & Communication
rd Technology (CICT), 2017 3 International Conference on (pp. 1-4). IEEE.
[8]. Jeeva, A. L., Palanisamy, D. V., & Kanagaram, K.
(2012). Comparative analysis of performance efficiency
and security measures of some encryption algorithms.
International Journal of Engineering Research and
Applications (IJERA), 2(3), 3033-3037.
[9]. Madaan, S., & Agrawal, R. K. (2012). Implementation
of identity based distributed cloud storage encryption
scheme using PHP and C for Hadoop File System. In Tier 2
Federation Grid, Cloud & High Performance Computing
th Science (RO-LCG), 2012 5 Romania (pp. 74-77). IEEE.
[10]. Osseily, H. A., Haidar, A. M., & Kassem, A. (2008).
Implementation of RSA Encryption using Identical
Modulus Algorithm. In Information and Communication
Technologies: From Theory to Applications, 2008. ICTTA
rd 2008. 3 International Conference on (pp. 1-6). IEEE.
[11]. Pancholi, V. R., & Patel, B. P. (2016). Enhancement of
cloud computing security with secure data storage using
AES. International Journal for Innovative Research in
Science and Technology, 2(9), 18-21.
[12]. Panda, P. K., & Chattopadhyay, S. (2017). A hybrid
security algorithm for RSA cryptosystem. In Advanced
Computing and Communication Systems (ICACCS),
th 2017 4 International Conference on (pp. 1-6). IEEE.
[13]. Ramaporkalai, T. (2017). Security Algorithms in Cloud
Computing. International Journal of Computer Science
Trends and Technology (IJCST), 5(2), 500-503.
[14]. Suja, G. J., & Jose, S. (2016). New approach for
highly secured I/O transfer with data on timer streaming. In
Computing for Sustainable Global Development
rd (INDIACom), 2016 3 International Conference on (pp.
885-889). IEEE.
[15]. Verma, S., & Garg, D. (2014). An Improved RSA
Variant. International Journal of Advancements in
Technology, 5(2), 161-169.