RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.3, No. 1)Publication Date: 2013-01-01
Authors : Abhishek Patial; Sunny Behal;
Page : 34-38
Keywords : RSA; Data protection;
Abstract
Cloud computing presents IT organizations with a funda?mentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a core problem in cloud computing, there are some kind of solution that are provide some security with model, some technology. In this paper is attempt to secure data from unauthorized access, the Method of data security is RSA algorithm for providing data security by encrypting the given data based on the KEY combinations. And this data then can only be decrypted by authorized person by using his private key. For the same purpose Google application cloud has been implemented on IJCT Foundation, all data has of IJCT Foundation sifted to Google cloud and RSA security algorithm is implemented by us for secure data.
Other Latest Articles
- A New Model of the Lifetime of Wireless Sensor Networks in Pure Water Communications
- A tool for prototyping a precision GPS system
- Low Cost VoIP Architecture Using Open Source Software Component in Tertiary Institutions
- A Collective Statistical Analysis of Outdoor Path Loss Models
- Printed Arabic Characters Classification using A Statistical Approach
Last modified: 2016-06-30 14:19:40