Securing Cloud Environments: A Comparative Analysis of RSA and MRGA for Enhanced Data Protection

C. Vimala Josphine*
Department of Artificial Intelligence and Data Science, R. M. K Engineering College, Kavaraipettai, Thiruvallur District, Chennai, India.
Periodicity:January - June'2023
DOI : https://doi.org/10.26634/jcc.10.1.19937

Abstract

Cloud computing revolutionizes the way businesses are stored and managed, and ensures robust security measures. This paper explores the use of Rivest-Shamir-Adleman (RSA) and the Magic Rectangle Generating Algorithm (MRGA) to enhance security in cloud environments. This highlights the growing significance of cloud computing and the need for effective security measures. It then introduces RSA and MRGA as cryptographic algorithms with their unique strengths and applications. It further delves into the benefits of using RSA and MRGA for data protection, key management, authentication, and identity management in cloud environments. The potential of these algorithms to address security challenges in the cloud and improve the overall data security is discussed. Additionally, the abstract acknowledges the limitations and considerations associated with the implementation of the RSA and MRGA. This emphasizes the importance of this research in enhancing cloud security and provides insights into the potential of RSA and MRGA as security measures in the cloud.

Keywords

Cloud Security, RSA, MRGA, Data Protection, Key Management.

How to Cite this Article?

Josphine, C. V. (2023). Securing Cloud Environments: A Comparative Analysis of RSA and MRGA for Enhanced Data Protection. i-manager's Journal on Cloud Computing, 10(1), 38-46. https://doi.org/10.26634/jcc.10.1.19937

References

[1]. Alese, B. K., Philemon, E. D., & Falaki, S. O. (2012). Comparative analysis of public-key encryption schemes. International Journal of Engineering and Technology, 2(9), 1552-1568.
[3]. Arak, M. V., Salunke, D. T., Merai, T. A., & Sutar, P. B. (2017). Session password authentication using Magic Rectangle Generation Algorithm (MRGA). International Journal of Innovative Science and Research Technology, 2(4), 264-269.
[4]. Bassi, S., & Chaudhary, A. (2015). Cloud computing data security–background and benefits. International Journal of Computer Science & Communication, 6(1), 34-40.
[5]. Gandhi, H., Gupta, V., & Rajput, I. (2015). A Research on enhancing public key cryptography by the use of MRGA with RSA and N-Prime RSA. International Journal for Innovative Research in Science & Technology, 1(12), 91-98.
[7]. Kaliski Jr, B. S., & Pauley, W. (2010). Toward risk assessment as a service in cloud environments. In 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10) (pp. 1-7).
[8]. Kim, A., McDermott, J., & Kang, M. (2010, June). Security and architectural issues for national security cloud computing. In 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops (pp. 21-25). IEEE.
[13]. Mani, K., & Viswambari, M. (2017). Enhancing the security in cryptosystems based on magic rectangle. International Journal of Computer Network & Information Security, 9(4).
[15]. Saravanan, N., Mahendiran, A., Subramanian, N. V., & Sairam, N. (2012). An implementation of RSA algorithm in google cloud using cloud SQL. Research Journal of Applied Sciences, Engineering and Technology, 4(19), 3574-3579.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.