Effective Renewal and Signing Method to Achieve Secure Storage and Computation Using Hybrid RSA-MABC Algorithm

  title={Effective Renewal and Signing Method to Achieve Secure Storage and Computation Using Hybrid RSA-MABC Algorithm},
  author={Anju Malik and V. Jain},
  journal={International Journal of Intelligent Engineering and Systems},
  • Anju Malik, V. Jain
  • Published 2016
  • Computer Science
  • International Journal of Intelligent Engineering and Systems
Cloud providers offer several storage services for their users in efficient manner. Cloud users are allowed to store their data in cloud. The data leakage, lack of proper security control policy, and weakness in the data security are the main worries of the companies. We intended to propose a secure cloud storage system RSA-ABC algorithm for encryption and decryption process. Initially the user will login with the aid of private key and public key. Then send a request to the data base… Expand
1 Citations
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world. The cloud storage systemExpand


A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture
New security architecture for cloud computing platform is proposed that ensures secure communication system and hiding information from others and can be easily applied with main cloud computing features, e.g. PaaS, SaaS and IaaS. Expand
Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication
A new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication and access control and has the added feature of access control in which only valid users are able to decrypt the stored information. Expand
A scalable and efficient user authentication scheme for cloud computing environments
The theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries. Expand
Multi-factor Authentication Framework for Cloud Computing
The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system and shows the close agreement with the standard criteria for security. Expand
Privacy-Preserving Public Auditing For Secure Cloud Storage
The proposed system is capable of supporting public auditability, data dynamics and Multiple TPA are used for the auditing process and extends the concept to ring signatures in which HARS scheme is used. Expand
Privacy Preserving Access Control with Authentication for Securing Data in Clouds
  • S. Ruj, M. Stojmenovic, A. Nayak
  • Computer Science
  • 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
  • 2012
In the proposed scheme, the cloud verifies the authenticity of the user without knowing the user's identity before storing information, and the added feature of access control in which only valid users are able to decrypt the stored information. Expand
Secure cloud authentication using eIDs
This work enables eID authentication at two selected public cloud service providers by applying the STORK framework for secure cloud authentication using eIDs and moved the STork framework to the cloud to apply the full cloud computing paradigm. Expand
A cloud computing security solution based on fully homomorphic encryption
This new security solution is fully fit for the processing and retrieval of the encrypted data, and effectively leading to the broad applicable prospect, the security of data transmission and the storage of the cloud computing. Expand
Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing
Security analysis and experimental results illustrate that the proposed two-factor authentication scheme based on Schnorr digital signature and feature extraction from fingerprint can withstand the common security attacks as well, and has a good performance of password authentication. Expand
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud is indeed intact, and in particular the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data storedIn the cloud. Expand