Data Security in Cloud Storage Using Elliptical Curve Cryptography

Total Page:16

File Type:pdf, Size:1020Kb

Data Security in Cloud Storage Using Elliptical Curve Cryptography International Journal of Pure and Applied Mathematics Volume 120 No. 6 2018, 27-38 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/ DATA SECURITY IN CLOUD STORAGE USING ELLIPTICAL CURVE CRYPTOGRAPHY 1S. Arun, M.E., 2N. R. Shanker 1Research Scholar, 2Ph.D, Professor/ Supervisor-Aalim Muhammed Salegh College of Engineering Department of Computer and Science Engineering PRIST University, Thanjavur, Tamilnadu Abstract: Computational applications and data cloud computing. The elements of the cloud architecture processing are increasing rapidly that large servers and were interfaced through the application programs. The data centre is required for quick processing within the application program was divided into two segments specified time. A major shift in the way Information namely front end and back end. Providing an example for Technology (IT) and computing services is that the a cloud computing, the user stores the data and program results are delivered and purchased results in the cloud in the cloud memory, the cloud agent provides the link computing development. The out of control power cost between the data and program components in such a way that includes personal hardware, electricity generation that the program codes do not know the location of the and data centre's limited space have promoted a specific stored data. The users gain profit by reducing its work of number of enterprises to transfer many infrastructures scheduling their workload, and the cloud agents provide into a third-party cloud. However, Cloud computing the interfaces between different users interfaced with the needs that organisations should prove that the platforms cloud infrastructure. This process of providing maximum of a service provider are secured and should provide control to the cloud agents generate many security enough level of integrity for the client's data. Elliptical concerns in maintaining integrity and confidentiality in curve cryptography is a public key encryption method accessing the workload by cloud users. that is based on elliptical curve theory, and this method The main advantage of the cloud computing is can be applied for creating faster, smaller and efficient providing virtualisation. The virtualisation can be cryptographic keys. A critical factor is the strength of the generated for hardware’s, application programs and also key that is the problem in key and acquiring the plain for middlewares. A security system is required to text. overcome the security threat in the virtualisation environment. Many researches are taking place to Keyword: ECC, RSS, Honey Algorithms, Symmetric, improve the security in virtual environments. The Asymmetric algorithm, cloud computing. research in the cloud security provides the knowledge that existing security schemes will not be perfect for 1. Introduction securing the cloud systems. The security requirement and the threat models are unique for the cloud system. The The origin of grid computing promoted the development security in the cloud system was implemented in two of cloud computing, providing security for the cloud data layers. First layer is to isolate the workloads from each is a major issue faced by Information Technology user and second is to provide security for their Community. Cloud computing is a new concept which workloads. Many solutions are provided to generate becomes a rising technology that increasing the attentions isolation of workloads were virtualisation based security of industrial organisations and educational institutions. mechanism is promoted for providing isolation between The limitations in the maintenance of storage devices the users. promote the enterprises to move to cloud computing, Securing an individual workload is a harder task were the cloud storages are maintained by the third party were the cloud computing provides the support for grid providers. Cloud computing provides a link between the computing which provides the link between physical and central remote servers and the network to handle data and virtual servers. The network framework of the cloud remote services. This technology provides flexibility in computing is represented in figure 1. handling the applications and data from the cloud without installing any additional software in their computers only need is to connect their computers with the internet. Handling the data in the cloud provides more advantages on maintaining the hardware system. The Cloud architecture comprises of client systems which provide the data and applications to the cloud storage and the cloud components which provides the 27 International Journal of Pure and Applied Mathematics Special Issue Figure 1. Cloud Computing Architecture Figure 2. Symmetric Encryption Three entities involved in the cloud computing are The Asymmetric key algorithm uses different keys users, cloud service providers and the third party to encrypt and decrypt the data bit. The keys are auditors. Securing the data in cloud service required represented as public and private keys, where the data cryptographic encryptions which isolates the users from owner handles the private key, and the public key is accessing others information or workload. The data provided to the authorised recipients. The specific private stored in the cloud server was encrypted and the user key will decrypt the data encrypted by the recipient access the data from the cloud server will decrypt the public key. Figure 3 shows the flow of the asymmetric data with the key provided for access. The encryption is algorithm. The data is more secured in transmitting using the process of converting the plain information into a asymmetric encryption. The asymmetric algorithm takes chipper text. The chipper text is an order less or much time for execution than the symmetric algorithm. meaningless information which is generated by the encryption algorithm in the certain pattern. Decryption is the process of converting the chipper text into the original plain text. The decryption algorithm reverses the process of encryption to generate the plain text. The main aim of the encryption algorithm is to generate a tough chipper text which should be ordered to decrypt without using the proper decrypt key. The size of the key proportionally toughens the decryption of chipper text without a proper key. Selecting the encryption algorithm is very important. The quality of the encryption algorithm should be maintained strictly. The algorithm looks promising may be very easy to break. A tougher encryption algorithm to be selected to secure the data from attack. The encryption algorithms are divided into two important types. They are symmetric and asymmetric encryption algorithm. The type is generated based on the type of key Figure 3. Asymmetric Encryption used to encrypt and decrypt the information bit. Symmetric encryption uses a common key for This process also provides authentication for the users. encryption and decryption process. Thus maintaining the Digital signatures are also used for authentication of security in exchanging key between sender and receiver users. Hashing is used to generate fixed length variables plays a vital role. Figure 2 shows the flow of the which are used to generate the digital signature to protect symmetric key algorithm. the data form unauthorised users. Drawbacks of the symmetric algorithm Symmetric key cryptography needs to exchange key with the receiver before transferring the chipper text. Any mode of communication is vulnerable to attack so transferring the key through the network is vulnerable to 28 International Journal of Pure and Applied Mathematics Special Issue attack only way to exchange the key securely is by decrypt, & sign to this number of attributes in the transferring personally. functions. [3] Digital signatures cannot be used for authenticating Sensors integration along with cloud-based on the users in the network. analysis and data storage has the potential to increase the efficiencies, adaptability and resilience of dealing with 2. Literature Survey the smart infrastructure. A standout context application is a smart grid; it gives an electricity rescue service on an In Ciphertext-policy, attribute-based encryption (CP- ability to protect, monitor and optimise the different ABE) aim is a key management collaborative protocol. functions are connecting the components by using the Our structure makes as a distributed generation, storage service provider into a consumer. An ability to manage and issue of private keys it is not contributing extra and read smart grid evaluations are remotely by infrastructure. A quick attribute revocation and fine- employing the wireless sensors significantly that grained is allowed for key modify.[1] The known appropriate grid operators to load balance, on-demand technology is cryptography that is based on Attribute to enable services and efficiently for different entities. fine-grained access data control and guarantee data.[3] A Anywhere the cloud infrastructure adoption in smart grid fine-grained access data control system along with poses to deal with the sensor data, its important risks to computation outsourcing and ciphertext update in fog consumers privacy and data security. This data can be calculating for an Internet of Things (IoT).[3] This disclosed to unwarranted parties or malicious, on the advanced collaborative mechanism is effectively solve potential for different security attacks, its accountability, key exposure and key escrow issues.
Recommended publications
  • Building a Cloud-Enabled File Storage Infrastructure
    F5 White Paper Building a Cloud-Enabled File Storage Infrastructure A cloud-enabled infrastructure can help your organization seamlessly integrate cloud storage and maximize cost savings, while also offering significant benefits to your traditional file storage environments. by Renny Shen Product Marketing Manager White Paper Building a Cloud-Enabled File Storage Infrastructure Contents Introduction 3 What Makes a Cloud? 3 Types of Cloud Storage 4 What Makes Cloud Storage Different? 4 Accessing Files Remotely over the Network 5 Accessing Files on Object-Based Storage 5 Unique Cost Structure 6 Where Clouds Make Sense 7 Fitting the Cloud into a Tiered Storage Framework 7 Expanding the Parameters for Tiering with the Cloud 8 Defining Cloud-Enabled 9 Integrating Different Types of Storage 10 Non-Disruptive File Migration 11 Automated Storage Tiering 11 Benefits of a Cloud-Enabled Infrastructure 12 Reduced Storage Costs 12 Reduced Backup Times and Costs 13 Reduced Operational Costs 13 The F5 Cloud Storage Model 13 Creating a Private Cloud 15 Conclusion 18 2 White Paper Building a Cloud-Enabled File Storage Infrastructure Introduction Cloud storage offers enterprise organizations the opportunity to bring constantly rising file storage costs and management burden under control. By moving appropriate types of files to the cloud, organizations can reduce not only the amount of storage capacity that they need to purchase, but also the operational overhead involved in managing it. In addition, the cloud enables storage capacity to be increased on demand, while charging organizations only for the amount of storage that is actually utilized. Cloud storage will bring many changes to the way enterprises manage storage.
    [Show full text]
  • Hybrid Cloud Storage with Cloudian Hyperstore® and Amazon S3
    SOLUTION BRIEF Hybrid Cloud Storage with Cloudian HyperStore® and Amazon S3 NEW DATA STORAGE CHALLENGES With the popularity of rich media, the nt,%and%the%proli.eraon%o.%mobile%de8ices2%there%has%bee digiN5aon%o.%conte n% e:ponenNal%growth%in%the%amount o.%unstructured%data that IT%is%tasked%with%managing?and%the%rate%o.%this%growth%is% only%accelerang.%TradiNonal%networked%storage%approaches2%such%as%SAC%and%CAS2%.ail%to%meet the%per.ormance%and% throughput demands% o.% this% new% generaon% o.% IT% as% they% lack% the% scalability2% De:ibility% and% agility% which% modern% business%reEuires.%In%.act,%whole%legacy%storage%systems%are%breaking%down.%Fackups%and%restores%take%longer.%Migraon% to%new%storage%systems%is%labor%intensi8e.%And%the%list goes%on%and%on.%As%a result,%many%enterprise%organi5aons%are% mo8ing%to%hybrid%IT%en8ironments2%combining%the%De:ibility%and%scale%o.%the%cloud%with%the%security%and%control%o.%their% on-­‐premises%IT%capabiliNes.%In%this%respect,%Iloudian%and%Amazon%are%changing%the%game.%% HYBRID CLOUD SOLUTION BENEFITS Iloudian% HyperStore% soKware% pro8ides% cost-­‐eLecN8e% SbOect storage% has% changed% the% li8es% o.% enterprise% pri8ate% cloud% storage% which% deploys% on% commodity% customers2% sa8ing% them% Nme% and% money% while% hardware%housed%within%enterprise%IT%data centers%and% increasing% per.ormance% and% peace% o.% mind.% Tey% seamlessly% integrates% with% the% oL-­‐premises% Amazon% benePts%o.%using%Iloudian%and%Amazon%to%build%hybrid% cloud% in.rastructure.% IT% managers% can% dynamically% cloud9%"nclude: control%bi-­‐direcNonal%data Nering%to%and%.rom%Amazon% • Impro8ed% security% and% per.ormance% by% using% on-­‐ S3% and% Nlacier% at the% bucket le8el2% 8ia bucket li.ecycle% premises%cloud%storage%.or%criNcal%business%content rules.%Fucket rules%can%also%be%set up%to%automacally% and% the% most cost eLecN8e% and% highly% reliable% oL-­‐ e:pire%obOects%aer%a predetermined%amount o.%Nme%or% premises%cloud%storage%.or%long%term%data archi8al.% specific date.
    [Show full text]
  • Security Services Using ECDSA in Cloud Computing
    Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Security Services using ECDSA in Cloud Computing S.Sathish* D.Sumathi P.Sivaprakash Computer Science and Engineering Computer Science and Engineering Computer Science and Engineering Jaisriram Group of Institutions, India PPG Institute of Technology, India PPG Institute of Technology, India Abstract— Cloud computing security is the set of control-based technologies and policies designed to comply to the rules and regulations framed by the provider team to support and protect information, data applications and infrastructure associated with cloud computing use. Cloud computing security process should address the issues faced by the cloud users. Cloud Service Provider needs to incorporate the maintenance activity in order to provide the customer's data security, privacy and compliance with necessary regulations. The Elliptic Curve Digital Signature Algorithm (ECDSA) is a public key cryptosystem used for creation and verification of digital signatures in securing data uploaded by the cloud users. Information security concerns have been focused so that identifying unwanted modification of data, deletion of data is identified. Keywords— Cloud Computing,ECDSA,Crptography,RSA, I. INTRODUCTION Cloud computing is internet-based computing, where by shared resources, software and information are provided to computers and other devises on demand. It is a culmination of numerous attempts at large scale computing with seamless access to virtually limitless resources. Cloud Computing providers offer their services according to three fundamental models, namely Infrastructure-as-a- Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) which is illustrated in figure 1.
    [Show full text]
  • Overview of Cloud Storage Allan Liu, Ting Yu
    Overview of Cloud Storage Allan Liu, Ting Yu To cite this version: Allan Liu, Ting Yu. Overview of Cloud Storage. International Journal of Scientific & Technology Research, 2018. hal-02889947 HAL Id: hal-02889947 https://hal.archives-ouvertes.fr/hal-02889947 Submitted on 6 Jul 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Overview of Cloud Storage Allan Liu, Ting Yu Department of Computer Science and Engineering Shanghai Jiao Tong University, Shanghai Abstract— Cloud computing is an emerging service and computing platform and it has taken commercial computing by storm. Through web services, the cloud computing platform provides easy access to the organization’s storage infrastructure and high-performance computing. Cloud computing is also an emerging business paradigm. Cloud computing provides the facility of huge scalability, high performance, reliability at very low cost compared to the dedicated storage systems. This article provides an introduction to cloud computing and cloud storage and different deployment modules. The general architecture of the cloud storage is also discussed along with its advantages and disadvantages for the organizations. Index Terms— Cloud Storage, Emerging Technology, Cloud Computing, Secure Storage, Cloud Storage Models —————————— u —————————— 1 INTRODUCTION n this era of technological advancements, Cloud computing Ihas played a very vital role in changing the way of storing 2 CLOUD STORAGE information and run applications.
    [Show full text]
  • Rclone VFS and Mergerfs Setup
    Rclone VFS and MergerFS Setup This guide is for advanced users only and it serves as a guide for you to use rclone and mergerFS. The files here are the recommended settings for our slots and will subject to change whenever there are new configurations that are appropriate for the slots. Furthermore, USB is not responsible for any data loss or application errors due to this setup should you proceed and will not provide official support for it due to the large volume of variables and different configurations possible with rclone and mergerFS. You may visit the community discord server or the software's respective forums for assistance. Please make yourself aware of the Ultra.cc Fair Usage Policy. It is very important not to mount your Cloud storage to any of the premade folders, this creates massive instability for both you and everyone else on your server. Always follow the documentation and create a new folder for mounting. It is your responsibility to ensure usage is within acceptable limits. Ignorance is not an excuse. Please do not mount to any of the default directories such as: files media bin .apps .config www /homexx/username/ or any pre-created directory found on your Ultra.cc Slot This section will teach you how to set up a rclone VFS mount and MergerFS on Ultra.cc slots, and it assumes the following: You have a working rclone setup, especially correctly configured remotes of your preferred cloud storage provider. In this tutorial, we'll be using Google Drive. If you use another cloud storage provider, change the flags that are appropriate to your setup and visit rclone documentation for more information.
    [Show full text]
  • Sebastian Witowski
    I made a website! Now what? Sebastian Witowski 1 Disclaimer There are many great tools at CERN (OpenShift). This presentation is not about those tools. 2 This presentation is about external tools 3 Free to use Open source Good value/money Good service Supports FOSS/education 4 Hosting 5 Cloud hosting Physical server vs VPS: Billed for real usage (per second on AWS) Easy to scale 6 Hosting providers AWS (EC2 and Amazon Lightsail) Free tier for 1 year (2x t2.micro, 1 DB, 5GB storage, etc.) Complex pricing model DigitalOcean From $5/month (512MB RAM, 20GB storage, 1TB transfer) Additional storage from $0.10/GB/month Linode From $5/month (1GB RAM, 20GB storage, 1TB transfer) Additional storage from $0.10/GB/month Heroku PaaS: more expensive, but easier to use (less congurable) 1 dyno free forever (512 MB RAM, 10k PostgreSQL rows) 7 Server parameters Storage - 20GB is plenty (use AWS S3 for more) Transfer - 1TB is usually more than enough CPU - 1 CPU is ne for simple website RAM - the more the better (caching, DB, etc.) 8 Cloud computing 9 When a VPS is not enough AWS Free tier for 1 year (VPS, DB, S3, Lambda and more) More features than competition Longest time on market == more 3rd party libraries Google Cloud $300 free credits to spend during rst 12 months "Always free" tier with VPS (1 f1-micro, 30GB storage), DB (1GB NoSQL), storage (5 GB), messaging, logging, serverless functions, but also NLP, speech and vision API Azure 30 days free trial with $200 free credits, some services free for 12 months and some free forever Good support for Windows applications 10 Static websites 11 When a VPS is too much GitLab pages Supports any static site generator Free Continuous Integration Slightly more complicated setup GitHub pages Supports only Jekyll (to use other static site generators, you need to precompile les locally) Easy, out-of-the-box setup Both are free and offer separate websites for projects and organizations.
    [Show full text]
  • Cloudpools and Google Cloud Architectural Overview, Considerations, and Best Practices
    Technical White Paper Dell EMC PowerScale: CloudPools and Google Cloud Architectural overview, considerations, and best practices Abstract This white paper provides an overview of Dell EMC™ PowerScale™ CloudPools software in OneFS™ 9.1.0.0. It describes its policy-based capabilities that can reduce storage costs and optimize storage by automatically moving infrequently accessed data to Google Cloud. April 2021 H17993.3 Revisions Revisions Date Description October 2019 Initial release June 2020 Updated best practices October 2020 Updated CloudPools operations April 2021 Updated best practices Acknowledgments Author: Jason He ([email protected]) Dell EMC and the authors of this document welcome your feedback on this white paper. This document may contain certain words that are not consistent with Dell's current language guidelines. Dell plans to update the document over subsequent future releases to revise these words accordingly. This document may contain language from third party content that is not under Dell's control and is not consistent with Dell's current guidelines for Dell's own content. When such third party content is updated by the relevant third parties, this document will be revised accordingly. The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2019 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc.
    [Show full text]
  • Comparison of Availability Between Local and Cloud Storage Leviathan Security Group
    Comparison of Availability Between Local and Cloud Storage Leviathan Security Group limitless innovation. no compromise. Introduction The U.S. National Institute for Standards and Technology denes cloud computing as having ve essential characteristics: on-demand self- service for provisioning, network access, the use of virtual machines to provide servers, rapid elastic provisioning and release of servers, and metering capability on the service provided.1 This paper seeks to answer whether, from the perspective of availability of data, especially in the face of natural or manmade threats to data and access, cloud computing is able to provide a greater benet than local data storage. For the purposes of this discussion, local data storage will include arrangements where data is kept on business premises or in a nearby datacenter, such as a colocation facility or other rigidly-provisioned resource. We will rst examine the signicant dierentiator that cloud computing provides in this space, and then examine dierent scales of threats to availability to see whether local data storage or cloud data storage fares better against known historical threats. 2 The Cloud Dierentiator: Geographic Redundancy At its heart, cloud computing and cloud storage are exactly the same as computing and storage provided through a datacenter or SOHO server; the cloud is made of computers. The dierence between cloud- based storage and local storage is that using cloud-based storage allows replication between separate geographic regions. Indeed, the key feature of
    [Show full text]
  • File Gateway for Hybrid Cloud Storage Architectures AWS Whitepaper File Gateway for Hybrid Cloud Storage Architectures AWS Whitepaper
    File Gateway for Hybrid Cloud Storage Architectures AWS Whitepaper File Gateway for Hybrid Cloud Storage Architectures AWS Whitepaper File Gateway for Hybrid Cloud Storage Architectures: AWS Whitepaper Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. File Gateway for Hybrid Cloud Storage Architectures AWS Whitepaper Table of Contents Abstract ............................................................................................................................................ 1 Abstract .................................................................................................................................... 1 Introduction ...................................................................................................................................... 2 File Gateway Architecture .................................................................................................................... 3 File to Object Mapping ............................................................................................................... 3 Read/Write Operations and Local Cache ......................................................................................
    [Show full text]
  • The Cloud Storage Standard
    Cloud Data Management Interface (CDMI) The Cloud Storage Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. CDMI – The Cloud Storage Standard 2 © 2010 Storage Networking Industry Association. All Rights Reserved. Abstract The SNIA has published the CDMI Cloud Storage standard for implementation by cloud storage vendors as well as Public and Private clouds. This tutorial will overview the features of the new standard and explain how interoperability between clouds is achieved. Now that the standard is available, what should you be requiring from your cloud vendors? How can you expect this standard to roll out in implementations? Learning Objectives How this cloud storage standard can achieve interoperability and what that means to you.
    [Show full text]
  • The Cloud V. Data Center Decision
    SPECIAL REPORT The cloud v. data center decision COPYRIGHT ©2017 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CLOUD V. DATA CENTER DECISION TABLE OF CONTENTS 03 Cloud v. data center: Key trends for IT decision-makers 11 Infographic: Cloud use is growing, but the data center isn’t dead yet 12 Understanding the pros and cons of five cloud types 16 Five major pitfalls to avoid in a cloud migration 19 Multi-cloud is a messy reality, but there’s hope 23 Six reasons why companies hang on to their data centers 27 Has IT’s default setting switched from data center to cloud? 30 How hybrid cloud is strengthening Fitness First 2 COPYRIGHT ©2017 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CLOUD V. DATA CENTER DECISION CLOUD V. DATA CENTER: KEY TRENDS FOR IT DECISION-MAKERS BY CHARLES MCLELLAN Cloud-based compute, networking and storage infrastructure, and cloud-native applications, are now firmly on the radar of IT managers—be they in startups, small businesses or large enterprises. So much so that, whereas a few years ago the question facing CIOs was “Which workloads should I move to the cloud?”, it’s now becoming “Which, if any, workloads should I keep on-premises?”. While most organisations will probably end up pursuing a hybrid cloud strategy, it’s worth examining this turnaround, and the reasons behind it. The general background, as ZDNet has explored in recent special features, is the competitive pressure for organisations to undergo a digital transformation based on cloud-native applications and methods such as DevOps, in pursuit of improved IT and organisational performance.
    [Show full text]
  • ECC Algorithm & Security in Cloud
    International Journal of Advanced Research in ISSN : 2347 - 8446 (Online) Computer Science & Technology (IJARCST 2016) Vol. 4, Issue 1 (Jan. - Mar. 2016) ISSN : 2347 - 9817 (Print) ECC Algorithm & Security in Cloud IC. Nithiya, IIR. Sridevi IM. Phil. Scholar, Dept. of Computer Science, PSG College of Arts and Science, Coimbatore, India. IIAssistant Professor, Dept. of Computer Science, PSG College of Arts and Science, Coimbatore, India. Abstract Security in cloud computing is an evolving area in today’s world. It is subject of concern for Cloud Technology Services. One of the measures which customers can take care of is to encrypt their data before it is stored on the cloud. This work is intended towards providing security service such as confidentiality in the cloud services which use Elliptic Curve Cryptography (ECC) algorithm instead of familiar and generalized RSA for data encryption because of its advantages in terms of smaller key sizes, lower CPU time and less memory usage. Keywords Security, Elliptic Curve Cryptography, RSA, Key Generation and Cloud Technology. I. Introduction public key and private or traditional identity based cryptography With the invention of cloud, the days of keeping all your documents, that has some identity elements that fit well in the requirement of photos, music files etc. on your computer’s hardware are gradually cloud computing. This work aims at improving cloud computing coming to a close. Today, the cloud storage is fulfilling the need for within Cloud Organizations with encryption awareness based on more storage space to hold all of your digital data. Cloud storage Elliptic Curve Cryptography. providers operate large data centers, and people who require their To secure data, most systems use a combination of techniques, data to be hosted buy or lease storage capacity from them.
    [Show full text]