Asymmetric Addition Chaining Cryptographic Algorithm (ACCA) for Data Security in Cloud

  • D. I. George Amalarethinam
  • H. M. Leena
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 645)


Cloud computing is a centralized network which enables the movement of data and application software and access the resources on demand. Although this type of computing meets the need of the users, various issues present in the cloud decreases the usage of resources. Among them, security is one of the major issues. The users move to the cloud for storing their sensitive data. Thus, data protection is a key concern. Cryptography is the conventional method applied for securing data in an efficient way. Encryption and decryption processes of cryptography proposed by various predefined algorithms take much time. Thus, the concentration must be given to reduce the time of these processes. Many methodologies exist for reducing the time which is more mathematical in nature. One among them is the concept of addition chaining method. The proposed asymmetric cryptographic algorithm uses the concept of addition chaining to reduce the time spent both in encryption and decryption processes.


Cloud computing Data security Cryptography RSA Addition chaining 


  1. 1.
    Aggarwal, N., Tyagi, P., Dubey, B.P., Pilli, E.S.: Cloud computing: data storage security analysis and its challenges. Int. J. Comput. Appl. 70, 33–37 (2013)Google Scholar
  2. 2.
    Li, Y., Ma, Q.: Design and implementation of layer extended shortest addition chains database for fast modular exponentiation in RSA. In: International Conference on Web Information Systems and Mining, pp. 136–139 (2010)Google Scholar
  3. 3.
    Mani, K.: Generation of addition chain using deterministic division based method. Int. J. Comput. Sci. Eng. Technol. 4, 553–560 (2013)Google Scholar
  4. 4.
    Domínguez-Isidro, S., Mezura-Montes, E.: An evolutionary programming algorithm to find minimal addition chains. 22 (2011)Google Scholar
  5. 5.
    Clift, N.M.: Calculating optimal addition chains. Open access— (2010)Google Scholar
  6. 6.
    Mezura-Montes, E., Domínguez-Isidro, S., Osorio-Hernández, L.G.: Addition chain length minimization with evolutionary programming. ACM (2011)Google Scholar
  7. 7.
    George Amalarethinam, D.I., Leena, H.M.: Enhanced RSA algorithm for data security in cloud. Int. J. Control Theor. Appl. 9, 147–152 (2016)Google Scholar
  8. 8.
    George Amalarethinam, D.I., Leena, H.M.: Enhanced RSA algorithm with varying key sizes for data security in cloud. IEEE Xplore Library (2017)Google Scholar
  9. 9.
    George Amalarethinam, D.I., Sai Geetha, J., Mani, K.: Analysis and enhancement of speed in public key cryptography using message encoding algorithm. Indian J. Sci. Technol. 8, 1–7 (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Jamal Mohamed College (Autonomous)TrichyIndia
  2. 2.Holy Cross College (Autonomous)TrichyIndia

Personalised recommendations