Performance analysis of mRSA for varying key sizes and data modulus

International Journal of Mobile Computing and Application
© 2015 by SSRG - IJMCA Journal
Volume 2 Issue 2
Year of Publication : 2015
Authors : Manvi goyal and Jatin Sharma
pdf
How to Cite?

Manvi goyal and Jatin Sharma, "Performance analysis of mRSA for varying key sizes and data modulus," SSRG International Journal of Mobile Computing and Application, vol. 2,  no. 2, pp. 19-25, 2015. Crossref, https://doi.org/10.14445/23939141/IJMCA-V2I3P121

Abstract:

As all we know that we depend on internet, because everything is going to be shifted on internet. Because internet is one of the way from where we can share any information globally. As Mostly organizations or any enterprise shift their data on internet to access their data from anywhere. Now, in this modern era there is a new technology which is named as cloud computing is used. Cloud computing doesn’t required any hardware devices and storage devices but we have an internet connection So it can be used by an Enterprises or an organization to access data from anywhere. Cloud computing gained importance because it reduced the cost of storage and processing, growth technologies of visualization. In this paper we describe the security issues of cloud computing i.e. we analyze the time of encryption and decryption by sending messages. Before analyzing this issue, we discuss definition of cloud computing, then its characteristics. Then we discuss various models of cloud computing, platforms and some other things and give some solution for security issues.

Keywords:

Service models, computing services, identity based encryption, mediated RSA

References:

[1] “Simple Identity-Based Cryptography with Mediated RSA”, Xuhua Ding, Gene Tsudik (2003), CT-RSA LNCS 2612, Pages 192-209.
[2] Vidyanand Choudhary, “Software as a service: Implications for investment in software development In HICSS '07” Proceedings of the 40th Annual Hawaii International Conference on System Sciences, page 209a, Washington, DC, USA, 2007. IEEE Computer Society.
[3]  “Identity-based Broadcast Encryption Scheme with Untrusted PKG”, Shanqing Guo, Chunhua Zhang (2008), The 9th International Conference for Young Computer Scientists, Pages 1613-1618.
[4] V. Krishna Reddy, B. Thirumala Rao, Dr. L.S.S. Reddy and P. Sai Kiran , “Research Issues in Cloud Computing”, Global Journal of Computer Science and Technology, Vol. 11 No. 11 July 2011. 
[5] A. Verma, L. Cherkasova, V. S. Kumar, and R. H. Campbell, “Performance-driven task co-scheduling for map reduce environments,” in Network Operations and Management Symposium (NOMS), 2012 IEEE.
[6] Anitha Y, “Security Issues in Cloud Computing – A review”,  International Journal  of Thesis projects and dissertations, Vol 1, Issue 1, Month October- December 2013.
[7] Elashry, I., Mu, Y. & Susilo, W. (2013). Identity-based mediated RSA revisited. Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and      Communications (pp. 728-735). IEEE
[8] P. Subhasri, Dr. A. Padmapriya, “Implementation of Reverse Ceaser Cipher Algorithm for cloud computing”, International Journal for advanced Research in Engineering and Technology, Vol-1, Issue VI, July-2013.
[9] K Hashizume et al., “An analysis of security issues for cloud computing”, Journal of Internet Services and Applications, a Springer open journal, pp 1-13, 2013.
[10] Dr.A.Padmapriya, P.Subhasri,” Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Security”, International Journal of Engineering Trends and Technology (IJETT) - Volume4, Issue4, pp 1067-1071, 2013.