Improving Cloud Computing Data Security with the RSA Algorithm

Authors

  • Akhil Raj Gaius Yallamelli Author

Keywords:

Cloud Computing,, RSA Algorithm,, Data Security,, Encryption, Decryption, Key Management, GDPR, HIPAA,, PCI DSS, Asymmetric Cryptography,, Redundancy, Public Key, Private Key

Abstract

The handling, analysis, and access of data by enterprises has been completely transformed by cloud computing, which provides many benefits. But it also poses serious security risks, especially when it comes to data protection, confidentiality, integrity, availability, and location. Strong security measures are crucial to addressing these issues and guaranteeing the dependability of cloud services. The RSA (Rivest-Shamir-Adleman) algorithm is one useful tool for improving data security in cloud computing settings. By using prime factorization complexity for both encryption and decryption, the popular asymmetric cryptographic technique RSA provides secure communication on erratic networks. A vital component of cryptography, RSA was created in 1977 and improves digital privacy, integrity, and authenticity by doing away with the requirement for shared secret keys. Its adaptability may be seen in a number of digital applications, such as internet connection security protocols and email security. Cryptographic libraries like OpenSSL and Bouncy Castle, which provide key generation, encryption, decryption, and digital signature verification features, are necessary for the implementation of RSA encryption in cloud computing. Working together, researchers, cloud providers, and cybersecurity specialists can create RSA- based security solutions that are specifically designed for cloud environments. Data security is further strengthened by major cloud providers like Microsoft Azure and Amazon Web Services including RSA encryption capabilities. Encouraging cloud computing providers to handle, transfer, and store data securely is the main goal of RSA integration. RSA encryption improves total data security and dependability in cloud environments by guaranteeing data confidentiality, integrity, and availability. For RSA implementation to be optimized and regulatory standards compliance to be ensured, more research and development is necessary due to persistent issues including scalability and effective key management.

Downloads

Download data is not yet available.

Downloads

Published

16-06-2021

How to Cite

Improving Cloud Computing Data Security with the RSA Algorithm. (2021). International Journal of Information Technology and Computer Engineering, 9(2), 163-174. https://ijitce.org/index.php/ijitce/article/view/228