A Comparison of ECC and Improved ECC Algorithm for Cloud Security

Authors

  • V. Vincy  MPhil Research Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichy, Tamil Nadu, India
  • Dr. B. Sathees Kumar  Associate Professor Department of Computer Science, Bishop Heber College (Autonomous), Trichy, Tamil Nadu, India

Keywords:

Cloud Computing, ECC, AES

Abstract

Cloud computing is a distributed environment that encompasses thousands of computers that work in parallel to perform a task in lesser time than the traditional computing models. This parallelism enables the low cost virtualization of hardware resources with increased computational performances. Cloud computing provides tremendous opportunity for small and medium scale enterprises to grow their business using IT services with zero deployment cost. Whenever, a task is distributed over web, there encounters a series of potential threats that challenges the security of data such as buffer overflow, session hijacking and black hole attacks. A cloud computing based services also face such kinds of security issues where applications deployed on cloud can face same kind of attacks as that on client-server model. Storage as a Service (SaaS) based applications are vulnerable to virus attacks .Online operating systems are available on cloud to the user for free .Viruses can spread as attachments of email, of part of the software or can stay in Master Boot Record (MBR) of the operating system available on cloud. Worms residing on one system in cloud can migrate to another system on its own. Trojan horse is software with wrong intentions. Thus the present system needs an effective mechanism to address the problem encountered in cloud computing.This thesis is intended to provide an enhanced security service in cloud computing model using an enhanced Elliptic Curve Cryptography algorithm for securing user data over cloud. The thesis is also extended to present both the theoretical and empirical results of the proposed improved elliptic curve based public key cryptography to prove that the model is better than the traditional RSA based schemes in terms of encryption, decryption time and key sizes.

References

  1. Arora, Akshay, Abhirup Khanna, Anmol Rastogi, and Amit Agarwal. "Cloud security ecosystem for data security and privacy." In Cloud Computing, Data Science & Engineering-Confluence, 2017 7th International Conference on, pp. 288-292. IEEE, 2017.
  2. Thu Yein Win “Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing”. IEEE Transactions on Big Data (Volume: PP, Issue: 99 2017.
  3. Xiao-tao, Xu, Chen Zhe, Jiang Fei, and Wang Hui-tao. "Research on service-oriented cloud computing information security mechanism." In Computer and Communications (ICCC, 2016 2nd IEEE International Conference on, pp. 2697-2701. IEEE, 2016.
  4. Jayapandian, N., AMJ Md Zubair Rahman, R. B. Sangavee, and R. Divya. "Improved cloud security trust on client side data encryption using HASBE and Blowfish." In Green Engineering and Technologies (IC-GET, 2016 Online International Conference on, pp. 1-6. IEEE, 2016.
  5. Ahmad, Naim. "Cloud computing: Technology, security issues and solutions." In Anti-Cyber Crimes (ICACC, 2017 2nd International Conference on, pp. 30-35. IEEE, 2017.
  6. Shokri, Reza, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, and Jean-pierre Hubaux. "Hiding in the Mobile Crowd: Location Privacy through Collaboration." In IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, SPECIAL ISSUE ON “SECURITY AND PRIVACY IN MOBILE PLATFORMS. 2016.
  7. Chhabra, Sakshi, and Ashutosh Kumar Singh. "Dynamic data leakage detection model based approach for MapReduce computational security in cloud." In Eco-friendly Computing and Communication Systems (ICECCS, 2016 Fifth International Conference on, pp. 13-19. IEEE, 2016.
  8. Bhamare, Deval, Tara Salman, Mohammed Samaka, Aiman Erbad, and Raj Jain. "Feasibility of Supervised Machine Learning for Cloud Security." In Information Science and Security (ICISS, 2016 International Conference on, pp. 1-5. IEEE, 2016.
  9. Yuan, Man, Shuning Pang, and Qiang Gao. "Design and development of data security automatic testing system on public cloud." In Software Engineering and Service Science (ICSESS, 2016 7th IEEE International Conference on, pp. 992-995. IEEE, 2016.
  10. El Makkaoui, Khalid, Abdellah Ezzati, Abderrahim Beni-Hssane, and Cina Motamed. "Cloud security and privacy model for providing secure cloud services." In Cloud Computing Technologies and Applications (CloudTech, 2016 2nd International Conference on, pp. 81-86. IEEE, 2016.

Downloads

Published

2018-08-30

Issue

Section

Research Articles

How to Cite

[1]
V. Vincy, Dr. B. Sathees Kumar, " A Comparison of ECC and Improved ECC Algorithm for Cloud Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.501-507, July-August-2018.