Randomized Round Crypto Security Encryption Standard for Secure Cloud Storage

Randomized Round Crypto Security Encryption Standard for Secure Cloud Storage

Anitha K., Anto Arockia Rosaline R., Devipriya A., Nancy P., Vijaya K.
DOI: 10.4018/979-8-3693-4159-9.ch019
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Due to the heightened expenses associated with maintaining extensive data storage infrastructure on-premises, many organizations face challenges in accommodating large volumes of data within their facilities. Data outsourcing proves beneficial for users as it alleviates the responsibility of storing and managing the data. While efforts have been made to establish a secure and reliable cloud platform for data storage, persistent concerns linger regarding the confidentiality and integrity of data and applications stored in the cloud. Consequently, there exists a critical necessity to establish a robust security framework for cloud-based data storage. In response to this, a proposal is presented for a secure block-level cloud storage system, leveraging the efficient randomized round encryption protocol for encryption and decryption, ensuring the storage and management of sensitive data in a secure manner.
Chapter Preview
Top

Background

The costs associated with managing large amounts of data on-premises, including servers and storage devices, are challenging. Data outsourcing relieves users of the responsibility for storing and managing data. Although significant efforts have been made to create a secure and stable cloud platform for data storage, issues still need to be resolved, particularly regarding the confidentiality, integrity of data and applications stored in the cloud.

Therefore, there is a vital need for a robust security framework (Tsochev et al., 2022) to protect data stored in the cloud. To address these concerns, the proposed solution includes a secure block-level cloud storage system designed to store and manage sensitive data. This system uses a strong encryption standard called Random Round Crypto Security Encryption Standard for encryption and decryption processes.

RSA Algorithm

The RSA encryption system (Mahajan et al, 2013 and Khatoon et al., 2014), operates as a public-key encryption system wherein the encryption key is public and distinct from the secret decryption key. In RSA, the public key is derived from two undisclosed prime numbers and an auxiliary value, while the secrecy of these prime numbers is maintained. Encryption of messages can be done using the public key, but only those know the prime numbers can decrypt them.

To articulate the public key, two prime numbers which are larger, represented as 'p' and 'q', are chosen, and 'n' is estimated by multiplying 'p' and 'q'. Following this, a derived number 'e' is determined within the range 1≥e≤ (p − 1)(q − 1). The combination of numbers (n, e) constitutes the public key.

The private key 'd' is computed from 'p', 'q', and 'e', with 'd' serving as the inverse of 'e' modulo (p - 1)(q – 1). This implies that 'd' is a number less than (p - 1)(q - 1) in such a way that when multiplied by 'e', it equals 1 modulo (p - 1)(q - 1). In the encryption of plaintext 'P', the process encompasses a mathematical step expressed as C = Pe mod n, where 'C' denotes the resultant ciphertext. Conversely, the decryption process involves another mathematical notation Plaintext = Cd mod n.

Complete Chapter List

Search this Book:
Reset