z-logo
Premium
An efficient RSA cryptosystem by applying cuckoo search optimization algorithm
Author(s) -
Raja shree S.,
Chilambu Chelvan A.,
Rajesh M.
Publication year - 2018
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.4845
Subject(s) - computer science , cloud computing , encryption , cryptosystem , algorithm , public key cryptography , data security , cuckoo search , key (lock) , computer network , distributed computing , computer security , operating system , particle swarm optimization
Summary Cloud computing is a promising technology that provides ubiquitous and on‐demand network access to a shared pool of configurable computing devices. However, the security is a major challenge in cloud environment due to the data sharing via the internet and data stored in the cloud. In cloud computing, there are various security issues such as confidentiality, integrity, and authentication. Among these issues, data integrity play a significant role in the cloud computing and various techniques were proposed to secure the data stored in the cloud. In this paper, an efficient RSA algorithm is proposed to overcome the data integrity problem in the cloud by applying Cuckoo Search Optimization (CSA) algorithm. In this, the encryption of data and secret key generation is done using RSA cryptosystem for securing data from unauthorized users'. In order to avoid the brutal force attack, CSA algorithm is used to optimize the encryption of the key. The simulation results demonstrate that the proposed algorithm performs faster than the conventional RSA and Data Encryption Standard (DES) algorithms. Moreover, the proposed algorithm provides better throughput while increasing the private key length of the algorithm.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here