Posted Date : 02nd Jan, 2026
International Journal of All Research Education & Scientific Metho...
Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Securing Data Using RSA Encryption
Author Name : P. Ushasri, P. Madhulika, S. Hyndavi, T. C Swetha Priya
Data security is a crucial concern that ought to be managed to help protect vital data. Cryptography is one of the conventional approaches for securing data and is generally considered a fundamental data security component that provides privacy, integrity, confidentiality, and authentication. In this project, a data security algorithm is proposed by implementing traditional RSA. The implementation raises the security of the data with RSA Algorithm. The data Interpolation is used to encrypt the ASCII values of the message after which the traditional RSA is used to encrypt and decrypt the message. The last stage employs Gaussian Backward Interpolation to decrypt the data again. Cloud computing stored the data and disseminated resources in open environments. Even though cloud computing is promising and efficient, there are many challenges for data security as there is no vicinity of the data for the cloud user. The security of cloud computing has always been an important aspect of quality of service from cloud service providers. Cloud computing is technical and social reality today, at the same time it is emerging technology and security has become the main obstacle which is hampering the deployment of cloud environments. To ensure the security of data, we proposed a method for providing data storage and security in cloud using public key cryptosystem by implementing RSA algorithm. Further describes the security services includes key generation, encryption, decryption in virtual environment.
Keywords : Public Key, Encryption, RSA, Asymmetric, Security, Prime number, Plain text, owner, user, password, Cryptography, cloud , IP address, Communication