ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing

Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.3, No. 1)

Publication Date:

Authors : ; ;

Page : 34-38

Keywords : RSA; Data protection;

Source : Download Find it from : Google Scholarexternal

Abstract

Cloud computing presents IT organizations with a funda?mentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a core problem in cloud computing, there are some kind of solution that are provide some security with model, some technology. In this paper is attempt to secure data from unauthorized access, the Method of data security is RSA algorithm for providing data security by encrypting the given data based on the KEY combinations. And this data then can only be decrypted by authorized person by using his private key. For the same purpose Google application cloud has been implemented on IJCT Foundation, all data has of IJCT Foundation sifted to Google cloud and RSA security algorithm is implemented by us for secure data.

Last modified: 2016-06-30 14:19:40