Open Access   Article Go Back

Providing Arithmetic Operations on RSA using Homomorphic Technique

Shiwali 1 , G.K. Bhalla2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-9 , Page no. 43-47, Sep-2016

Online published on Sep 30, 2016

Copyright © Shiwali, G.K. Bhalla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shiwali, G.K. Bhalla, “Providing Arithmetic Operations on RSA using Homomorphic Technique,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.43-47, 2016.

MLA Style Citation: Shiwali, G.K. Bhalla "Providing Arithmetic Operations on RSA using Homomorphic Technique." International Journal of Computer Sciences and Engineering 4.9 (2016): 43-47.

APA Style Citation: Shiwali, G.K. Bhalla, (2016). Providing Arithmetic Operations on RSA using Homomorphic Technique. International Journal of Computer Sciences and Engineering, 4(9), 43-47.

BibTex Style Citation:
@article{Bhalla_2016,
author = {Shiwali, G.K. Bhalla},
title = {Providing Arithmetic Operations on RSA using Homomorphic Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2016},
volume = {4},
Issue = {9},
month = {9},
year = {2016},
issn = {2347-2693},
pages = {43-47},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1053},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1053
TI - Providing Arithmetic Operations on RSA using Homomorphic Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Shiwali, G.K. Bhalla
PY - 2016
DA - 2016/09/30
PB - IJCSE, Indore, INDIA
SP - 43-47
IS - 9
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1882 1536 downloads 1501 downloads
  
  
           

Abstract

Cloud computing is a sound area for the field of research. In the current scenario of advanced technology the client and server architecture is been shifting from distributed or cluster to cloud architecture. The main part of this research relies on robust architecture which deals with Cloud Storage as a Service (SAAS) and comparative security measures of improvement and modifications [1]. Cloud computing is the internet based technology which providing the computing resources in the form of services over the internet. But security is the main issue occurred in the cloud computing because of that growth of cloud computing is less.By using cryptography algorithms, we improve the data security in cloud computing. The cryptography algorithms are used for purpose of secure transmission of private or secret message. There are several number of cryptography algorithms but here we integrate the new technique with RSA algorithm using Homomorphic Encryption and performing the arithmetic process on RSA which improving the security level without compromising the security of existing technique [2]. In this paper our main work to ensure the security of data, so we proposed a method by implementing RSA algorithm using Homomorphic Encryption.

Key-Words / Index Term

Cloud Computing; Encryption; Decryption; RSA; Homomorphic Technique

References

[1] Yamuna, V. and Priya, A. (2015), �efficient and secure storage in cloud computing RSA and DES function� International Journal of Innovation Research in Computer and Communication Engineering, ISSN 2320-9801, Vol. 3, issue 7, July 2015.
[2] Saveetha, P and Arumugam, S. (2015), �Study on Improvement in RSA Algorithm and its Implementation�, IJCCT, Vol. 3, Issue 6, 7 august 2012, pp 61-65.
[3] Jirwan, N.; Singh, A. and Vijay, S. (2013), �Review and Analysis of Cryptography Techniques�, International Journal of Scientific & Engineering Research, Vol. 4, March 2013.
[4] Yang, P.; Gui, X.; Yao, J.; Lin, J and Tian, F. (2013), �ICDM: An Encryption that Supports Unlimited Times Homomorphic Arithmetic Operations on Encrypted Data�, IEEE 16th International Conference on Computational Science and Engineering, 2013, pp 1220-1225
[5] Shivlal Mewada, Sharma Pradeep, Gautam S.S. (2016), �Classification of Efficient Symmetric Key Cryptography Algorithms�, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol. 14, No. 2, pp (105-110), Feb 2016
[6] Kahte, A. (2013), �Cryptography and Network Security�, 2nd Edition, Biswarup Nil Kundu, 09 August, 2013.
[7] Gupta, P. and Gupta, S. (2012), �Mobile Cloud Computing: The Future of Cloud�, IJAREEIE, Vol. 1, September 2012, pp 134-145.
[8] Prasad, M.R.; Gyani, J and Murti, P.R.K. (2012), �Mobile Cloud Computing: Implications and Challenges�, Journal of Information Engineering and Applications, Vol. 2, 7, 2012, pp 7-15.
[9] Shivlal Mewada, Sharma Pradeep, Gautam S.S. (2016), �Exploration of Efficient Symmetric Algorithms�, 3rd IEEE International Conference on �Computing for Sustainable Global Development�, 16th -18th March, 2016, ISBN 978-93-80544-20-5
[10] Thambiraja, E.; Ramesh, G and Umarani, R. (2012), �A Survey on Various Most Common Encryption Techniques�, IJARCSSE, Vol. 2, July 2012, pp 226-233.
[11] Mewada, Shivlal, Pradeep Sharma, and S. S. Gautam(2016). "Exploration of efficient symmetric AES algorithm." In Colossal Data Analysis and Networking (CDAN), Symposium on, pp. 1-5. IEEE, 2016.
[12] Tebaa, M and Hajji, S.E. (2012), �Homomorphic Encryption Method Applied to Cloud Computing�, IEEE, June 2012, pp 86-89.
[13] Ranjit Ranjan, Dr. A.S Baghel, Sushil Kumar �improvement of NTRU cryptosystem� international journal of advanced research in computer science volume 2, issue September 2012.
[14] Parsi, K. (2012), �data security in cloud computing using RSA algorithm�, International Journal of Research in Computer and Communication technology, ISSN 2278-5841, Vol. 1, Issue 4, September 2012.
[15] Brenner, M.; Wiebelitz, J.; Vonvoigt, G and Smith, M. (2011), �Secret Program Execution in the Cloud Applying Homomorphic Encryption�, IEEE 5th International Conference on Digital Ecosystems and technologies (IEEE DEST), June 2011, pp 114-119.