Skip to main content

Scalable Security Based on Data Classification Using Generalized RSA in Cloud Storage

  • Conference paper
  • First Online:
Proceedings of ICETIT 2019

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 605))

Abstract

In cloud environment, huge amount of data is stored in data centers. These data are generated from numerous sources such as social media, social networking and others. These data are generally in form of text, image, audio or video. These data are exponentially increasing due to huge amount of multiple streams generating these data at every millisecond. Many of these data are permanently stored in data centers over cloud and rarely used. However, all of the data stored in data centers over cloud are encrypted using some encipherment mechanisms for providing security objectives. There are several mechanisms used for encipherment such as DES, RSA etc. Using any of these encipherment mechanisms involve huge amount of cost. The cost is usually borne by the service provider. In this paper, we devised a novel method for scalable security based on data classification using Generalized RSA-AA using 2n prime numbers. The objective of proposing a scalable security model based on Generalized RSA-AA. In this paper, a flow model has been presented discussing the encipherment of data as per their classification. The security imposed on the data can also be scaled up to desired security strength based on the requirement of the user or the importance of data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lone, A.H., Khalique, A.: Generalized RSA using 2k prime numbers with secure key generation. Secur. Commun. Netw. 9(17), 4443–4450 (2016)

    Article  Google Scholar 

  2. Guidelines for Data Classification. https://www.cmu.edu/iso/governance/guidelines/data-classification.html

  3. Tittel, E., Chapple, M., Shinder, D.L.: TICSA Training Guide. Pearson IT Certification (2002)

    Google Scholar 

  4. Khalique, A., Singh, K., Sood, S.: Implementation of elliptic curve digital signature algorithm. Int. J. Comput. Appl. 2(5), 21–27 (2010)

    Google Scholar 

  5. Stalling, W.: Cryptography and Network Security: Principles and Practice, 4th edn. Pearson, New Delhi (2011)

    Google Scholar 

  6. Rivest, R.L., Shamir, A., Adleman, L.A.: Method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  7. Thangavel, M., Varalakshmi, P., Murrali, M., Nithya, K.: An enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. 20, 3–10 (2015)

    Google Scholar 

  8. Eclipse Foundation. https://www.eclipse.org/ide/

  9. Uses of Class java.math.BigInteger. https://docs.oracle.com/javase/7/docs/api/java/math/BigInteger.html

  10. Uses of Class java.math.BigInteger. https://docs.oracle.com/javase/7/docs/api/java/math/class-use/BigInteger.html#java.security.interfaces

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Aqeel Khalique or Imran Hussain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khalique, A., Hussain, I., Afshar Alam, M., Khan, T.A. (2020). Scalable Security Based on Data Classification Using Generalized RSA in Cloud Storage. In: Singh, P., Panigrahi, B., Suryadevara, N., Sharma, S., Singh, A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, vol 605. Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_86

Download citation

Publish with us

Policies and ethics