DOI QR코드

DOI QR Code

Secure Data Sharing in The Cloud Through Enhanced RSA

  • Islam abdalla mohamed (Department of Computer Science, Jouf University) ;
  • Loay F. Hussein (Department of Computer Science, Jouf University) ;
  • Anis Ben Aissa (National School of Engineering University of Tunis) ;
  • Tarak kallel (Department of Physics, Jouf University)
  • Received : 2023.02.05
  • Published : 2023.02.28

Abstract

Cloud computing today provides huge computational resources, storage capacity, and many kinds of data services. Data sharing in the cloud is the practice of exchanging files between various users via cloud technology. The main difficulty with file sharing in the public cloud is maintaining privacy and integrity through data encryption. To address this issue, this paper proposes an Enhanced RSA encryption schema (ERSA) for data sharing in the public cloud that protects privacy and strengthens data integrity. The data owners store their files in the cloud after encrypting the data using the ERSA which combines the RSA algorithm, XOR operation, and SHA-512. This approach can preserve the confidentiality and integrity of a file in any cloud system while data owners are authorized with their unique identities for data access. Furthermore, analysis and experimental results are presented to verify the efficiency and security of the proposed schema.

Keywords

References

  1. Y. Zhang, J. Yu, R. Hao, C. Wang, and K. Ren, "Enabling efficient user revocation in identity-based cloud storage auditing for shared big data," IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 3, pp. 608 - 619, 2018. https://doi.org/10.1109/TDSC.2018.2829880
  2. Islam Abdalla Mohamed, Anis Ben Aissa and Loay F Hussein, "Classification For Iot Threats Based On The Analytic Hierarchy Process," International Journal of Scientific & Technology Reaearch vol. 9, 2020.
  3. O. A. Khashan, "Secure outsourcing and sharing of cloud data using a user-side encrypted file system," IEEE Access, vol. 8, pp. 210855-210867, 2020. https://doi.org/10.1109/ACCESS.2020.3039163
  4. X. Zhang, Y. Tang, S. Cao, C. Huang, and S. Zheng, "Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems," Journal of Information Security and Applications, vol. 54, pp. 102568, 2020.
  5. X. Zhang, Y. Tang, H. Wang, C. Xu, Y. Miao, and H. Cheng, "Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage," Information Sciences, vol. 494, pp. 193-207, 2019. https://doi.org/10.1016/j.ins.2019.04.051
  6. H. Wang, Y. Zhang, K. Chen, G. Sui, Y. Zhao et al., "Functional broadcast encryption with applications to data sharing for cloud storage," Information Sciences, vol. 502, pp. 109-124, 2019. https://doi.org/10.1016/j.ins.2019.06.028
  7. D. K. Shukla, V. K. R. Dwivedi, and M. C. Trivedi, "Encryption algorithm in cloud computing," Materials Today: Proceedings, vol. 37, pp. 1869-1875, 2020.
  8. J. Shen, X. Deng, and Z. Xu, "Multi-security-level cloud storage system based on improved proxy re-encryption," EURASIP Journal on Wireless Communications and Networking, vol. 2019, pp. 277, 2019.
  9. J. Raja and M. Ramakrishnan, "Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in. cloud location," The Journal of Supercomputing, vol. 76, no. 8, pp. 6026-6039, 2020. https://doi.org/10.1007/s11227-019-03111-1
  10. H. Deng, Z. Qin, L. Sha, and H. Yin, "A Flexible privacy-preserving data sharing scheme in cloud-assisted IoT," IEEE Internet Things Journal, vol 7, pp. 11601-11611, 2020. https://doi.org/10.1109/JIOT.2020.2999350
  11. S. Belguith, N. Kaaniche, M. Laurent, A. Jemai, and R. Attia, "Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds," Journal of Parallel and Distributed Computing, vol. 135, pp. 1-20, 2020. https://doi.org/10.1016/j.jpdc.2019.08.014
  12. Q. Wei, F. Qi, and Z. Tang, "Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation," Telecommunication Systems: Modelling, Analysis, Design and Management, vol. 69, no. 2, pp. 253-262, 2018. https://doi.org/10.1007/s11235-018-0461-1
  13. Mohd Saiful Adli Mohamad, Roshidi Din, and Jasmin Ilyani Ahmad, "Research trends review on RSA scheme of asymmetric cryptography techniques," Bulletin of Electrical Engineering and Informatics, Vol. 10, No. 1, pp. 487~492, 2021. https://doi.org/10.11591/eei.v10i1.2493
  14. Willy Susilo, Joseph Tonien and Guomin Yang, " Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA," Computer Standards & Interfaces, Vol 74, 2021.
  15. K.Jaspin, Shirley Selvan, Sahana.S and Thanmai.G, "Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm," 2021 International Conference on Emerging Smart Computing and Informatics,2021.
  16. Uma Somani, Kanika Lakhani and Manish Mundra, "Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing," First International Conference On Parallel, Distributed and Grid Computing, 2010.
  17. Randa Mohamed Abdel Haleem and Eltyeb Elsamani Abd Elgabar, "Enhancing the Integrity of Cloud Computing by Comparison between Blowfish and RSA Cryptography Algorithms," International Journal of Engineering Research & Technology,2022.
  18. P. Prem Priya and Jeevaa Katiravan, "Privacy‑Preserving and Energy‑Centered QoS for IoT Using XOR‑RSA and BM‑SSA," Wireless Personal Communications,2021. https://doi.org/10.23186/KOREA.000000252343.11009.0001216
  19. Hongbo Li, Qiong Huang, Sha Ma, Jian Shen, and Willy Susilo, "Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage," IEEE Access, vol. 7, pp. 25409-25421, 2019. https://doi.org/10.1109/ACCESS.2019.2899680
  20. Xu An Wang, Fatos Xhafa, Jianfeng Ma, Zhiheng Zheng, "Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme," Journal of Parallel and Distributed Computing, vol. 130, pp. 153-165, 2019. https://doi.org/10.1016/j.jpdc.2019.03.018
  21. M. Kumar and S. Chand, "ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers," Multimedia Tools and Applications, vol. 78, no. 14, pp. 19753-19786, 2019.
  22. Y. Kiran Kumar and R. Mahammad Shafi, "An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem," International Journal of Electrical and Computer Engineering, 2019.
  23. Priyadharshini Kaliyamoorthy and Aroul Canessane Ramalingam, "QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System," Wireless Personal Communications, 2021.
  24. Rohini and Er Tejinder Sharma, "Proposed hybrid RSA algorithm for cloud computing," Proceedings of the Second International Conference on Inventive Systems and Control, 2018.
  25. Anuj Kumar, Vinod Jain and Anupam Yadav, "A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique," International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control, 2020.
  26. Khalid El Makkaoui, Abderrahim Beni‑Hssane and Abdellah Ezzati, " Speedy Cloud‑RSA homomorphic scheme for preserving data confidentiality in cloud computing," Journal of Ambient Intelligence and Humanized Computing, 2019.
  27. I. Arockia Antony Samy and M. Safish Mary, "Secure Data Transmission in Cloud Computing Using Std-rsa With Eslurnn Data Classification and Blockchain Based User Authentication System," Research Square, 2022.
  28. Nidhi Kumari and Vimmi Malhotra, "Secure Cloud Data Storage Using Hybrid Cryptography," International Journal for Research in Applied Science & Engineering Technology, 2022.
  29. S. Selvi and M. Vimala Devi, "A Novel Hybrid Chaotic Map-Based Proactive RSA Cryptosystem in Blockchain," Recent Trends in Blockchain for Information Systems Security and Privacy, 2021.
  30. Chu Jiann Mok, Chai Wen Chuah, "An Intelligence Brute Force Attack on RSA Cryptosystem," Communications in Computational and Applied Mathematics, 2019.
  31. Majid Mumtaz and Luo Ping, "Forty years of attacks on the RSA cryptosystem: A brief survey," Journal of Discrete Mathematical Sciences and Cryptography,2019.
  32. Kritsanapong Somsuk, "The new integer factorization algorithm based on fermat's factorization algorithm and euler's theorem," International Journal of Electrical and Computer Engineering, 2020.
  33. Manish Kant Dubey, Ram Ratan, Neelam Verma and Pramod Kumar Saxena, "Cryptanalytic Attacks and Countermeasures on RSA," Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2014.
  34. Werner Schindler, "A Timing Attack against RSA with the Chinese Remainder Theorem," Cryptographic Hardware and Embedded Systems, 2002.
  35. Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuisa, and Jaap de Vos, "Bellcore attack in practice," Cryptology ePrint Archive, 2012.
  36. Johannes Blomer, Martin Otto and Jean-Pierre Seifert, "A New CRTRSA Algorithm Secure Against Bellcore Attacks", Proceedings of the 10th ACM conference on Computer and communications security, 2003.
  37. B. R. Ambedkar and S S Bedi, "A New Factorization Method to Factorize RSA Public Key Encryption, " IJCSI International Journal of Computer Science Issues, Vol. 8, November 2011.
  38. J. Pollard, "Monte Carlo methods for index computation (mod p)," Math. Comp., Vol. 32, pp.918-924, 1978. https://doi.org/10.1090/S0025-5718-1978-0491431-9