Enhancing Cloud Data Security using Hybrid of Updated RSA and Twofish Algorithms

Shouket Ahmad Kouchay*
King Saud University, Riyadh, Saudi Arabia.
Periodicity:September - November'2019
DOI : https://doi.org/10.26634/jit.8.4.17069

Abstract

In today's information technology world, cloud computing plays a major role. Cloud computing is dynamically flexible as well as sizable and cost-efficient including important virtual tools. Data security is the main concern in cloud computing. Different encryption techniques have been introduced to secure cloud computing, but the data is constantly under threat due to security exploits. This paper presents a hybrid Crypto method using updated RSA and TWOFISH algorithms to protect data integrity and security in cloud computing. The proposed technique is robust, fast and demonstrates better performance results. This research also highlights many security risks and solutions in cloud computing.

Keywords

RSA, Twofish Algorithm, Cloud Computing, Encryption, Decryption, Security.

How to Cite this Article?

Kouchay, S. A. (2019). Enhancing Cloud Data Security using Hybrid of Updated RSA and Twofish Algorithms. i-manager's Journal on Information Technology, 8(4), 1-7. https://doi.org/10.26634/jit.8.4.17069

References

[1]. Bhise, A. S., & Phursule, R. N. (2017). Developing secure cloud storage system by integrating trust and cryptographic algorithms with role based access control. International Journal of Computer Applications, 168(10), 18-23. https://doi.org/10.5120/ijca2017914510
[2]. Cloud Security Alliance (2011). Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance, 15.
[3]. Cloud Security Alliance (2013). Cloud security alliance warns providers of 'The Notorious Nine', The Notorious Nine Cloud Computing Top Threats in 2013.
[4]. Elbaz, L., & Bar-El, H. (2000). Strength assessment of encryption algorithms. White paper.
[5]. European Network and Information Security Agency. (2015). Cloud security guide for SMEs, European Union Agency for Cybersecurity.
[6]. Fang, Z., Sun, Y., Sun, Y., & Yang, J. (2013, July). The Reseach of AES algorithm and application in cloud storage system. In 2nd International Conference on Science and Social Research (ICSSR 2013). Atlantis Press. https://doi.org/10.2991/icssr-13.2013.158
[7]. Gehlot, P., Biradar, S. R., & Singh, B. P. (2013). Implementation of modified Twofish algorithm using 128 and 192-bit keys on VHDL. International Journal of Computer Applications, 70(13), 37-42.
[8]. Kaur, S. (2012). Cryptography and encryption in cloud computing. VSRD International Journal of Computer Science And Information Technology, 2(3), 242-249.
[9]. Kouchay, S. A. (2016). Security risks and impact of data protection techniques in cloud computing, International Journal of Innovative Research in Computer and Communication(IJCTT), 34, 179-185.
[10]. Kouchay, S. A. (2017). Robust cryptographic technique for improving data security in cloud computing. International Journal of Innovative Research in Science, Engineering and Technology, 6(5), 10048- 10053. https://doi.org/10.15680/IJIRSET.2017.0605356
[11]. Kumar, P., Sehgal, V. K., Chauhan, D. S., Gupta, P. K., & Diwakar, M. (2011). Effective ways of secure, private and trusted cloud computing. arXiv Preprint.
[12]. Li, Y., Liu, Q., & Li, T. (2010, April). Design and implementation of an improved RSA algorithm. In 2010, International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT) (Vol. 1, pp. 390-393). IEEE. https://doi.org/10.1109/EDT.2010.5496553
[13]. Liang, C., Ye, N., Malekian, R., & Wang, R. (2016, August). The hybrid encryption algorithm of lightweight data in cloud storage. In 2016, 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR) (pp. 160-166). IEEE. https://doi.org/10.1109/ ISAMSR.2016.7810021
[14]. Malik, A., & Om, H. (2018). Cloud computing and internet of things integration: Architecture, applications, issues, and challenges. In Sustainable cloud and energy services (pp. 1-24). Springer, Cham. https://doi.org/10. 1007/978-3-319-62238-5_1
[15]. Minni, R., Sultania, K., Mishra, S., & Vincent, D. R. (2013, July). An algorithm to enhance security in RSA. In 2013, Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1-4). IEEE. https://doi.org/10.1109/ICCCNT. 2013.6726517
[16]. Nigoti, R., Jhuria, M., & Singh, S. (2013). A survey of cr yptographic algorithms for cloud computing, International Journal of Emerging Technologies in Computational and Applied Sciences, 4, 141-146.
[17]. Open Security Architecture (2015). SP-011: Cloud C omp u t i n g Pa t t e r n . h t t p s : / / w w w. o p e n s e c u r i t y architecture.org/cms/librar y/patternlandscape/251- pattern-cloudcomputing
[18]. Ramesh, A., & Suruliandi, A. (2013, March). Performance analysis of encryption algorithms for Information Security. In 2013, International Conference on Circuits, Power and Computing Technologies (ICCPCT) (pp. 840-844). IEEE. https://doi.org/10.1109/ ICCPCT.2013.6528957
[19]. Rane, D. D. (2016). Superiority of Twofish over Blowfish. International Journal of Science and Research Management, 4(11), 4744-4746.
[20]. Schneier, B. (1993, December). Description of a new variable-length key, 64-bit block cipher (Blowfish). In International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg. https://doi.org/ 10.1007/3-540-58108-1_24
[21]. Wayne, J., & Timothy, G. (2011). National Institute of Standards and Technology (NIST) guidelines on security and privacy in public cloud computing. Draft Special Publication, 800-144.
[22]. Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless network security (pp. 103-135). Springer, Boston, MA. https://doi.org/10.1007/978-0-387- 33112-6_5
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.