Loading

An Efficient Secure and Flexible Data Sharing in Cloud Computing using Asymmetric Algorithm
A. Manimaran1, K. Somasundaram2

1A. Manimaran*, Research Scholar, Dept. of Computer Science and Engineering, St.Peter’s Institute of Higher Education and Research, St. Peter University, Avadi, Chennai.
2K. Somasundaram, Professor, Dept. of Computer Science and Engineering, Chennai Institute of Technology, Chennai.
Manuscript received on January 15, 2020. | Revised Manuscript received on January 22, 2020. | Manuscript published on February 10, 2020. | PP: 411-415 | Volume-9 Issue-4, February 2020. | Retrieval Number: C8923019320/2020©BEIESP | DOI: 10.35940/ijitee.C8923.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud Security is a technique of safeguarding applications, infrastructures and data involved in cloud computing. Cloud security uses a set of technologies, policies and controls to protect data and application from unauthorized access. RSA encryption and decryption algorithm is presented here for cloud security. The cloud can access the data only after receiving the user’s encrypted message using RSA algorithm. However, while transmitting the encrypted message more bandwidth is consumed as the message is transmitted over wireless channel. To minimize the bandwidth, the encrypted message is transmitted into a number of encoded bits and the cloud service provider can append the bits and recover the original message. The performance results for RSA algorithm and the RSA algorithm using Fountain Code are simulated. The results show that the energy, end-to-delay are minimized while using Fountain Code RSA algorithm. In addition, the packet loss ratio decrease and the packet delivery ratio increase. 
Keywords: Cloud Computing, Fountain Code RSA Algorithm, Wireless, Encryption, Decryption, end-to- delay
Scope of the Article:  Cloud Computing,