{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:41:50Z","timestamp":1777704110182,"version":"3.51.4"},"reference-count":34,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,10,7]]},"abstract":"<jats:p>Cloud has become one of the most demanding services for data storage. On another hand, the security of data is one of the challenging tasks for Cloud Service Provider (CSP). Cryptography is one of the ways for securing the storage data. Cryptography is not a new approach instead of the efficient utilization of cryptographical algorithms is greatly needed. In this work, we proposed a Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption. The SHL is consisting of two major modules (i) Key Management Server (KMS) and (ii) Share Holder Server (SHS) which is used for storing and sharing of cryptographic key. For this purpose, we proposed a server-side encryption algorithm, which is based on the asymmetric algorithm (RSA and CRT) for providing end-to-end security of multimedia data. The experimental results of text and video are evidence that the size of file is not much affected after the encryption and effectively stored at Cloud Storage Server (CSS). The parameters like ciphertext size, encryption time and throughput are considered for performance evaluation of the proposed encryption technique.<\/jats:p>","DOI":"10.3233\/jifs-191687","type":"journal-article","created":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T18:11:25Z","timestamp":1593195085000},"page":"3297-3314","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":22,"title":["K-RSA: Secure data storage technique for multimedia in cloud data server"],"prefix":"10.1177","volume":"39","author":[{"given":"Keshav","family":"Sinha","sequence":"first","affiliation":[{"name":"Department of Computer Science Engineering, Birla Institute of Technology, Mesra, Jharkhand, India"}]},{"given":"Annu","family":"Priya","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering, Birla Institute of Technology, Mesra, Jharkhand, India"}]},{"given":"Partha","family":"Paul","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering, Sarala Birla University, Ranchi, India"}]}],"member":"179","published-online":{"date-parts":[[2020,6,26]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.21236\/ada606588"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-012-9395-0"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","unstructured":"FurhtB. Data Encryption Standard (DES) and Advanced Encryption Standard (AES) Encyclopedia of Multimedia (2006) 135\u2013136. DOI: 10.1007\/0-387-30038-4_46","DOI":"10.1007\/0-387-30038-4_46"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.07.006"},{"key":"e_1_3_2_6_2","unstructured":"NivenI. ZuckermanH.S. and MontgomeryH.L. An Introduction to The Theory of Numbers fifth ed. Wiley India NewDelhi 1991. ISBN-10:0471625469 and ISBN-13:978-0471625469."},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.10.32"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","unstructured":"ZhangY. ZhengZ. and LyuM.R. BFTCloud: A Byzantine Fault Tolerance Framework for Voluntary-Resource Cloud Computing 2011 IEEE 4th International Conference on Cloud Computing (2011). DOI: 10.1109\/cloud.2011.16","DOI":"10.1109\/cloud.2011.16"},{"key":"e_1_3_2_9_2","unstructured":"Internet source: www.forbes.com\/sites\/forbestechcouncil\/2017\/01\/17\/why-cybersecurity-should-be-the-biggest-concern-of-2017\/#264538c65218."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","unstructured":"MeyersR.K. and DesokyA.H. An Implementation of the Blowfish Cryptosystem 2008 IEEE International Symposium on Signal Processing and Information Technology (2008). DOI: 10.1109\/isspit.2008.4775664","DOI":"10.1109\/isspit.2008.4775664"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","unstructured":"NieT. SongC. and ZhiX. Performance Evaluation of DES and Blowfish Algorithms 2010 International Conference on Biomedical Engineering and Computer Science (2010). DOI: 10.1109\/icbecs.2010.5462398","DOI":"10.1109\/icbecs.2010.5462398"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","unstructured":"SharmaM. and GargR.B. DES: The oldest symmetric block key encryption algorithm 2016 International Conference System Modeling & Advancement in Research Trends (SMART) (2016). DOI: 10.1109\/sysmart.2016.7894489","DOI":"10.1109\/sysmart.2016.7894489"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","unstructured":"RajputS. DhobiJ.S. and GadhaviL.J. Enhancing Data Security Using AES Encryption Algorithm in Cloud Computing Smart Innovation Systems and Technologies (2016) 135\u2013143. DOI: 10.1007\/978-3-319-30927-9_14","DOI":"10.1007\/978-3-319-30927-9_14"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.11.188"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.215"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.165"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.08.011"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.09.009"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2593512"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","unstructured":"AlizadehM. and HassanW.H. Challenges and opportunities of Mobile Cloud Computing 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) (2013). DOI: 10.1109\/iwcmc.2013.6583636","DOI":"10.1109\/iwcmc.2013.6583636"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcc.2015.2"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","unstructured":"SendiA.S. and CherietM. Cloud Computing: A Risk AssessmentModel 2014 IEEE International Conference on Cloud Engineering (2014). DOI: 10.1109\/IC2E.2014.17","DOI":"10.1109\/IC2E.2014.17"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.006"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","unstructured":"SohalM. and SharmaS. BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing Journal of King Saud University-Computer and Information Sciences (2018). DOI: 10.1016\/j.jksuci.2018.09.024","DOI":"10.1016\/j.jksuci.2018.09.024"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.005"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.09.033"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0375-z"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2757844"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6981-6"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.3233\/mgs-180296"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2939299"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.07.022"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","unstructured":"SimmonE. and BohnR. An Overview of the NIST Cloud Computing Program and Reference Architecture Concurrent Engineering Approaches for Sustainable Product Development in a Multi-Disciplinary Environment (2012) 1119\u20131129. doi:10.1007\/978-1-4471-4426-7_94","DOI":"10.1007\/978-1-4471-4426-7_94"},{"key":"e_1_3_2_34_2","unstructured":"Internet source: https:\/\/arstechnica.com\/information-technology\/2019\/12\/new-crypto-cracking-record-reached-with-less-help-than-usual-from-moores-law\/."},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","unstructured":"KleinjungT. AokiK. FrankeJ. LenstraA.K. Thom\u00e9E. BosJ.W. GaudryP. KruppaA. MontgomeryP.L. OsvikD.A. te RieleH. TimofeevA. and ZimmermannP. Factorization of a 768-Bit RSA Modulus Lecture Notes in Computer Science (2010) 333\u2013350. doi:10.1007\/978-3-642-14623-7_18","DOI":"10.1007\/978-3-642-14623-7_18"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-191687","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-191687","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-191687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:40:28Z","timestamp":1777455628000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-191687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,26]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,10,7]]}},"alternative-id":["10.3233\/JIFS-191687"],"URL":"https:\/\/doi.org\/10.3233\/jifs-191687","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,26]]}}}