Professional Documents
Culture Documents
Name
Institution
DATA SECURITY IN CLOUD COMPUTING USING RSA ALGORITHM 2
Cloud computing has become a key driving force in both profit and not-for profit
organization. Accordingly, the main concern has been securing confidential data because of the
platform’s critical nature and the extensive amounts of complex data backed up in open source
clouds. Particularly, privacy and security issues are proving the broader uptake of cloud
computing services; hence, the increased concern and exploration of cloud security challenges by
researchers. However, Kalpana and Singarajua deviate from the norm through providing
In their study, the authors provide a systematic description of the steps required in
developing and executing the public-key encryption system. The experimental data and
processes provide a rationale for adopting the RSA algorithm to mitigate security challenges
associated with cloud computing (Kalpana & Singarajua, 2012). However, the researchers do not
provide rationale for the prime numbers used in key generation, encryption, and decryption,
which are the main phases of the RSA algorithm public-key encryption system.
proposed system. When developing and advocating for the adoption or a particular technology, it
is imperative to establish the benefits and shortcomings associated with the proposed
development. However, the authors only provide the challenges the RSA algorithm can mitigate,
the processes, and the advantages. Besides, the RSA algorithm is based on the assumption that
Despite the noted shortcomings, Kalpana and Singarajua provide insightful information
regarding key generation, encryption and decryption, as well as the benefits of random number
generation. The researchers also provide a basis for future studies through noting that the
DATA SECURITY IN CLOUD COMPUTING USING RSA ALGORITHM 3
asymmetric, and hashing algorithm) and the size of input. Accordingly, future studies should
References
Kalpana, P., & Singaraju, S. (2012). Data security in cloud computing using RSA
algorithm. IJRCCT, 1(4), 143-146.