Paper Title : A Secure Model on Cloud using a Modified Rivest, Shamir and Adleman Algorithm along with Gray Codes
ISSN : 2394-2231
Year of Publication : 2021
MLA Style: Matthias D, Osakwe B. P, Anireh, V. I. E "A Secure Model on Cloud using a Modified Rivest, Shamir and Adleman Algorithm along with Gray Codes " Volume 8 - Issue 1 January-February , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Matthias D, Osakwe B. P, Anireh, V. I. E "A Secure Model on Cloud using a Modified Rivest, Shamir and Adleman Algorithm along with Gray Codes " Volume 8 - Issue 1 January-February , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
The widespread presence of insecurity in cloud computing environment is rapidly increasing in most countries, especially among businesses in developing countries due to poor knowledge and evaluation by Firm and Information Technology Experts, this system will help eliminate the security challenges and loopholes in which the current system is lacking behind with. The system was designed using a modified Rivert Shamir Adleman algorithm as well as server-side scripting language. The server side scripting languages used includes Java Server Pages, Hypertext Preprocessor, and My structured query language. The software system is a web-based application which was developed using JSP and PHP, MYSQL for the database. To enhance the security level of the system, gray codes where used to modify the RSA algorithm. This helped in solving not only the problem of security but also the speed of encryption and decryption of the previous system as gray codes are said to be weightless.
 N.Benvan, measuring usability as quality of use, software quality J.4 (1995) 115-130.  V.Sandhya, “A Study on Various Security Methods in Cloud Computing”, International Journal of Advanced Research in Computer Science, Nov-Dec 2011, Volume 2, No.6.  L.Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014  J.Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang,“A secure cloud computing based framework for big data information management of smart grid,” Institute of Electricals and Electronic Engineering, 2015.  C.Gentry, “A fully homomorphic encryption scheme,” Ph.D. dissertation, Stanford University, 2009.  S. Kamara and K. Lauter, “Cryptographic cloud storage,” in International Conference on Financial Cryptography and Data Security. Springer, 2010, pp. 136–149.  A.Hamlin, N. Schear, E. Shen, M. Varia, S. Yakoubov, and A. Yerukhimovich, “Cryptography for big data security,” in Big Data: Storage, Sharing, and Security, F. Hu, Ed. CRC Press, 2016, ch. 10, pp. 241–288.  T.Jung, X.-Y. Li, Z. Wan, and M. Wan, “Privacy preserving cloud data access with multiauthorities,” in INFOCOM, 2013 Proceedings Institute of Electricals and Electronic Engineering. IEEE, 2013, pp. 2625–2633.  A.Sahai and B. Waters, Fuzzy Identity-Based Encryption, in Proceedings of Advances in Cryptology - EUROCRYPT ’05, ser. LNCS, vol. 3494. Springer, 2005, pp. 457–473.  V.Goyal, O. Pandey, A. Sahai, and B. Waters,“Attribute-based encryption for finegrained access control of encrypted data,” in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 89–98  B.Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” Public Key Cryptography– PKC 2011, pp. 53–70. A.Lewko and B. Waters, “Decentralizing attribute-based encryption,” Advances in Cryptology–EUROCRYPT 2011, pp. 568–588, 2011.  C.Hu, X. Cheng, Z. Tian, J. Yu, K. Akkaya, and L. Sun, “An attributebased signcryption scheme to secure attribute-defined multicast communications,” in SecureCommunication, Springer, 2015, pp. 418–435. K.Yang, X. Jia, K. Ren, B. Zhang, and R. Xie,(2013) “Dac-macs: Effective data access control for multiauthority cloud storage systems,” Information Forensics and Security, Institute of Electricals and Electronic Engineering Transactions on, vol. 8, no. 11, pp. 1790– 1801.  K. Yang and X. Jia, “Expressive, efficient, and revocable data access control for multi-authority cloud storage,” Parallel and Distributed Systems, Institute of Electricals and Electronic Engineering Transactions on, vol. 25, no. 7, pp. 1735–1744, 2014.  K. Yang and X. Jia, “Attributed-based access control for multi-authority systems in cloud storage,” in Distributed Computing Systems (ICDCS), 2012Institute of Electricals andElectronic Engineering 32nd International Conference on. IEEE, 2012, pp. 536– 545.  R.Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures”. In Proceedings of CCS’06, New York, NY, 2007.
— RSA Algorithm, Gray codes, Cloud computing, Server side scripting.