An efficient Technique for Data Security using Improved Elliptic Curve Cryptosystem over Cloud Computing
DOI:
https://doi.org/10.32628/CSEIT239053Keywords:
Ecliptic Curve Cryptographic [ECC], RSA technique, deployment models, security techniquesAbstract
Recent years have seen a rapid expansion of the cloud computing industry, which may be visualized as a distributed computing environment where cloud resources can be distributed shared. In comparison to traditional systems, there are thousands of computers operating in parallel, completing the specified task quickly. The parallel processing is made possible by the low cost of these virtualized hardware resources. In this paper, we discuss several cloud deployment options and how they differ from conventional computers in terms of security. Different methods that minimize the cloud and the limitations of current cryptographic techniques can be used to analyse this security. This research introduces ecliptic curve cryptography technique for various cloud-based applications and compares this technique with existing RSA algorithm-based applications to analyse the security in deployment models. The suggested elliptic curve based public key cryptography is shown to be superior to the current RSA algorithm based applications in this paper's experimental and theoretical results. Our experimental findings show that the suggested ECA approach outperforms the RSA algorithm. This aids in the use of security solutions for the various cloud computing deployment patterns that have been studied.
References
- S. Subashini, V. Kavitha -Anna University Tirunelveli, India,” A survey on security issues in service delivery models of cloud computing “ELSEVIER- Journal of Network and Computer Applications Volume 34, Issue 1, January 2011, Pages 1–11.
- Jashanpreet Pal Kaur, Rajbhupinder kaur, Yadavindra College of Engineering, Talwandi Sabo, Bathinda Punjab, “Security Issues and Use of Cryptography in Cloud Computing" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 7, July 2014, ISSN: 2277 128X.
- Wang, L., Tao, J., & Kunze, M. (2008). “Scientific cloud computing: Early definition and experience”. Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Austin, TX, 825–830.
- Reservoir Project [URL]. http://www-03.ibm.com/press/us/en/pressrelease/23448.wss/, access on June 2008.
- Amazon Elastic Compute Cloud [URL]. http://aws. amazon. com/ ec2, access on Nov. 2007.
- IBM Blue Cloud project [URL]. http://www3.ibm.com/press /us/en/pressrelease/22613.wss/, access on June 2008.
- Nimbus Project [URL].http://workspace.globus.org/ clouds/nimbus.html/,access on June 2008.
- Status Project [URL]. http://www.acis.ufl.edu/vws/, access on June 2008.
- OpenNEbula Project [URL].http://www.opennebula.org /, access on Apr.2008.
- Shweta Sharma, Bharat Bhushan, Shalini Sharma - ”Improvising Information Security in Cloud Computing Environment”- International Journal of Computer Applications (0975 – 8887) Volume 86 – No 16, January 2014.
- D. J. Bernstein and T. Lange (editors). eBACS: ECRYPT Benchmarking of Cryptographic Systems, http://bench. crypto, October 2013.
- Dr.R.Shanmugalakshmi, M.Prabu – “Research Issues on Elliptic Curve Cryptography and Its applications”- IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.6, June 2009.
- Wang, H., Sheng, B. and Li, Q. (2006) ‘Elliptic curve cryptographybased access control in sensor networks’, Int. J. Security and Networks,Vol. 1, Nos. 3/4, pp.127–137.
- Ms Bhavana Sharma, B.P.I.T., Rohini, Delhi-“security architecture of cloud computing based on elliptic curve cryptography (ecc)” ICETEM 2013.
- Wikipedia, the free encyclopedia of Cloud Computing.
- Lim, I, Coolidge, E, Hourani, P, (2013) Securing Cloud and Mobility: A Practitioner´s Guide, USA, CRC Press.
- Yong yu,Liang Xue,Man Ho Au,Willy Susilo, Jianbing Ni,Yafang Zhang,Athanasios V. Vasilakos,Jian Shen,” Cloud data integrity checking with an identity-based auditing mechanism from RSA”.
- Vasanth.C.Bhagawat,Dr.A.Arul L.S.Kumar, “Survey on Data security Issues in cloud Environment”, in International Journal of innovative Research in Advanced Engineering (IJIRAE), vol.2, Issue 1. Jan. 2015.
- Depavath Harinath,et.al, “Enhancing Security through Steganography by using Sudoku Puzzle and ECC Algorithm” in International Journal for Research in Science Engineering and Technology(IJRSET) August 2015 Volume 2, Issue 6.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.