You are on page 1of 4

Running Head: DATA SECURITY IN CLOUD COMPUTING USING RSA ALGORITHM1

Critical Review of “Data Security in Cloud Computing using RSA Algorithm”

Name

Institution
DATA SECURITY IN CLOUD COMPUTING USING RSA ALGORITHM 2

Critical Review of “Data Security in Cloud Computing using RSA Algorithm”

Cloud computing has become a key driving force in both profit and not-for profit

organization. Accordingly, the main concern has been securing confidential data because of the

platform’s critical nature and the extensive amounts of complex data backed up in open source

clouds. Particularly, privacy and security issues are proving the broader uptake of cloud

computing services; hence, the increased concern and exploration of cloud security challenges by

researchers. However, Kalpana and Singarajua deviate from the norm through providing

solutions to the growing security problems.

In their study, the authors provide a systematic description of the steps required in

developing and executing the public-key encryption system. The experimental data and

processes provide a rationale for adopting the RSA algorithm to mitigate security challenges

associated with cloud computing (Kalpana & Singarajua, 2012). However, the researchers do not

provide rationale for the prime numbers used in key generation, encryption, and decryption,

which are the main phases of the RSA algorithm public-key encryption system.

Moreover, Kalpana and Singarajua fail to provide possible vulnerabilities to their

proposed system. When developing and advocating for the adoption or a particular technology, it

is imperative to establish the benefits and shortcomings associated with the proposed

development. However, the authors only provide the challenges the RSA algorithm can mitigate,

the processes, and the advantages. Besides, the RSA algorithm is based on the assumption that

gives security is maintained as long as the private key is private.

Despite the noted shortcomings, Kalpana and Singarajua provide insightful information

regarding key generation, encryption and decryption, as well as the benefits of random number

generation. The researchers also provide a basis for future studies through noting that the
DATA SECURITY IN CLOUD COMPUTING USING RSA ALGORITHM 3

performance of an algorithm varies according to the type of algorithm used (symmetric,

asymmetric, and hashing algorithm) and the size of input. Accordingly, future studies should

seek to uncover the variations in these types of algorithms.


DATA SECURITY IN CLOUD COMPUTING USING RSA ALGORITHM 4

References

Kalpana, P., & Singaraju, S. (2012). Data security in cloud computing using RSA

algorithm. IJRCCT, 1(4), 143-146.

You might also like