International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106

Survey Paper | Information Technology | India | Volume 5 Issue 8, August 2016


Up in the Air: Cloud Computing Security and RSA Algorithm

Pooja Bharadwaj | Shivani Mankotia


Abstract: Cloud computing has been the pillar of technology in the past few years, with some rare exceptions of organizations or businesses that have not accepted and/or embraced its power. The scope of this paper includes issues in Cloud Security, including major domains such as Confidentiality, Privacy, Data Integrity, Identity Management and other common aspects. One such focus in this disquisition is one of the possible solutions aiming to strengthen security, viz. Encryption and Decryption, using the RSA Algorithm. After covering various security aspects and issues in the initial segments, using brief and concise explanations, the challenges due to network concept are covered in the subsequent section. Further, the survey covers the recent works and developments or modifications in the RSA algorithm, in other words, its evolution over the recent years. RSA is one of the oldest algorithms for encryption and decryption and consists of basic three steps, Key Generation, Encryption, and Decryption. This is explained in the last section, where the algorithm itself is also presented.


Keywords: security, Cloud Computing, security aspects, security issues, encryption, decryption, RSA Algorithm


Edition: Volume 5 Issue 8, August 2016,


Pages: 1103 - 1107


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Pooja Bharadwaj, Shivani Mankotia, "Up in the Air: Cloud Computing Security and RSA Algorithm", International Journal of Science and Research (IJSR), Volume 5 Issue 8, August 2016, pp. 1103-1107, https://www.ijsr.net/get_abstract.php?paper_id=15081601

Similar Articles with Keyword 'security'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth | Bashar Dheyaa Noor | Ammar Dheyaa Noor [2]

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 7, July 2022

Pages: 133 - 137

Wearable Computers of Leading Edge Generation and their Mystifying Mechanic's

Smital Wagh | Gunjan Behl

Share this Article
Top