PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

A Cloud-aided Group RSA Scheme in Java 8 Environment and OpenStack Software

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper a RSA based security system enabling the group of users to upload the single masked message to the cloud environment is proposed. Data stored are encrypted using RSA algorithm. The data receiver is able to encrypt the message retrieved from the cloud environment using private key. Two different separate RSA systems are used. The presented approach is divided into three parts. First, an RSA key is generated for each sender. Then masking the message by newly chosen mask proposed individually by every member, additionally encrypted by individual RSA private key of each member is proceed. Next, encrypting the gathered message inside the cloud environment, using the public key of the receiver is executed. In the third step, the message is decrypted by the receiver using his private RSA key. The scheme reduces the computational load on users side and transfers calculations and storage effort to the cloud environment. The proposed algorithm was developed for storing and sending the data that originally are produced by a group of users, but the receiver of the data is single. It was implemented using Java 8 and OpenStack software. Numerical test of different key length for RSA are presented.
Słowa kluczowe
Rocznik
Tom
Strony
53--59
Opis fizyczny
Bibliogr. 24 poz., rys., tab.
Twórcy
autor
  • Faculty of Physics, Mathematics and Computer Science, Tadeusz Kościuszko Cracow University of Technology, Warszawska st 24, 31-155 Cracow, Poland
Bibliografia
  • [1] J. Rittinghouse and J. Ransome, Cloud Computing: Implementation, Management, and Security. CRC Press, 2009.
  • [2] Google Cloud Platform [Online]. Available: https://cloud.google.com/
  • [3] Amazon Drive [Online]. Available: https://www.amazon.com/clouddrive/home
  • [4] Microsoft Cloud [Online]. Available: http://www.microsoft.com/enterprise/microsoftcloud
  • [5] Adobe Creative Cloud [Online]. Available: http://www.adobe.com/pl/creativecloud.html
  • [6] T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance. O’Reilly Media, 2009.
  • [7] W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing”, 2011 [Online]. Available: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf
  • [8] OpenStack website, https://www.openstack.org
  • [9] R. L. Rivest, “Cryptography”, in Handbook of Theoretical Computer Science, J. Van Leeuwen, Ed. MIT Press, 1990, vol. A, pp.717–755.
  • [10] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
  • [11] PKCS #1 RSA ver. 2.2 Cryptography standard, RSA Laboratories, Oct. 2012 [Online]. Available: http://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf
  • [12] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
  • [13] Google Cloud Documentation [Online]. Available: https://cloud.google.com/storage/docs/authentication
  • [14] Amazon Elastic Compute Cloud User Guide for Linux [Online]. Available: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html
  • [15] T. Dierks and E. Rescorla, “The Transport Layer Security (TLS) Protocol, Version 1.2”, Network Working Group, Aug. 2008 [Online]. Available: http://tools.ietf.org/html/rfc5246
  • [16] C.-H. Lin, C.-Y. Lee, and T.-W. Wu, “A cloud-aided RSA signature scheme for sealing and storing the digital evidences in computer forensics”, Int. J. Secur. & and Its Appl., vol. 6, no. 2, 2012.
  • [17] OpenStack Website, https://www.openstack.org/
  • [18] Java Platform Standard Edition 8 Documentation, Oracle, 2015 [Online]. Available: https://docs.oracle.com/javase/8/docs
  • [19] Java Platform, Standard Edition 8 API Specification, Oracle, 2015 [Online]. Available: https://docs.oracle.com/javase/8/docs/api/javax/crypto/Cipher.html
  • [20] National College of Ireland Website, https://www.ncirl.ie/
  • [21] D. Grzonka, “The analysis of OpenStack cloud platform: features and performance”, J. Telecommun. Inform. Technol., no. 3, pp. 52–57, 2015.
  • [22] OpenSSL, Cryptography and SSL/TLS Toolkit [Online]. Available: https://www.openssl.org
  • [23] D. Grzonka, M. Szczygieł, A. Bernasiewicz, A. Wilczyński, and M. Liszka, “Short analysis of implementation and recources utilization for the OpenStack cloud computing platform”, in Proc. 29th Eur. Conf. Modelling & Simul. ECMS 2015, Albena (Varna), Bulgaria, 2015.
  • [24] E. B. Barker et al., “Recommendation for Key Management, Part 1: General (Revised)”, NIST Special Publication 800-57, National Institute of Standards & Technology, Mar. 2007 [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2 Mar08-2007.pdf
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-7f6d5095-d4de-48d2-b70a-c1fb6777a512
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.