Abstract
In cloud environment, huge amount of data is stored in data centers. These data are generated from numerous sources such as social media, social networking and others. These data are generally in form of text, image, audio or video. These data are exponentially increasing due to huge amount of multiple streams generating these data at every millisecond. Many of these data are permanently stored in data centers over cloud and rarely used. However, all of the data stored in data centers over cloud are encrypted using some encipherment mechanisms for providing security objectives. There are several mechanisms used for encipherment such as DES, RSA etc. Using any of these encipherment mechanisms involve huge amount of cost. The cost is usually borne by the service provider. In this paper, we devised a novel method for scalable security based on data classification using Generalized RSA-AA using 2n prime numbers. The objective of proposing a scalable security model based on Generalized RSA-AA. In this paper, a flow model has been presented discussing the encipherment of data as per their classification. The security imposed on the data can also be scaled up to desired security strength based on the requirement of the user or the importance of data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lone, A.H., Khalique, A.: Generalized RSA using 2k prime numbers with secure key generation. Secur. Commun. Netw. 9(17), 4443–4450 (2016)
Guidelines for Data Classification. https://www.cmu.edu/iso/governance/guidelines/data-classification.html
Tittel, E., Chapple, M., Shinder, D.L.: TICSA Training Guide. Pearson IT Certification (2002)
Khalique, A., Singh, K., Sood, S.: Implementation of elliptic curve digital signature algorithm. Int. J. Comput. Appl. 2(5), 21–27 (2010)
Stalling, W.: Cryptography and Network Security: Principles and Practice, 4th edn. Pearson, New Delhi (2011)
Rivest, R.L., Shamir, A., Adleman, L.A.: Method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Thangavel, M., Varalakshmi, P., Murrali, M., Nithya, K.: An enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. 20, 3–10 (2015)
Eclipse Foundation. https://www.eclipse.org/ide/
Uses of Class java.math.BigInteger. https://docs.oracle.com/javase/7/docs/api/java/math/BigInteger.html
Uses of Class java.math.BigInteger. https://docs.oracle.com/javase/7/docs/api/java/math/class-use/BigInteger.html#java.security.interfaces
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Khalique, A., Hussain, I., Afshar Alam, M., Khan, T.A. (2020). Scalable Security Based on Data Classification Using Generalized RSA in Cloud Storage. In: Singh, P., Panigrahi, B., Suryadevara, N., Sharma, S., Singh, A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, vol 605. Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_86
Download citation
DOI: https://doi.org/10.1007/978-3-030-30577-2_86
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30576-5
Online ISBN: 978-3-030-30577-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)