University of Cape Town
Total Page:16
File Type:pdf, Size:1020Kb
UNIVERSITY OF CAPE TOWN DEPARTMENT OF ELECTRICAL ENGINEERING DATA STORAGE SECURITY FOR CLOUD COMPUTING USING ELLIPTIC CURVE CRYPTOGRAPHY. GEORGE ONYANGO BUOP Supervisor: DR. ALEXANDRU MURGU A thesis Presented for the Degree of UniversityMaster of Engineering of in Telecommunication Cape Town The copyright of this thesis vests in the author. No quotation from it or information derived fromTown it is to be published without full acknowledgement of the source. The thesis is to be used for private study or non- commercial research purposes only.Cape Published by the University of Cape Town (UCT) in terms of the non-exclusive licenseof granted to UCT by the author. University Declaration I declare that all the work in the document, save for that which is properly acknowledged, is my own. I hereby declare that I have not submitted this material, either in whole or in part, for a degree at this or any other institution. Signature ……………………………………… Cape Town Acknowledgement First and foremost, my appreciation goes to the Almighty God who sustained me throughout the period of this program. I also want to acknowledge the contributions of my supervisor, Dr Alexandru Murgu, for the comments, corrections, suggestions and all other forms of support I have received towards the completion of this research work. My sincere appreciation is extended to colleagues who have been of great encouragement through their technical skills and suggestions while going through this path. I also would like to appreciate the friends who made the foreign land a home away from home, through their company, their support and continuous encouragement. Finally, my special appreciation goes to my parents and my family for being an inspiration, for the sacrifices they made to ensure I was able to go through this program to completion and for being there for me throughout this period. Thank you all. ii Table of Contents Declaration ..................................................................................................................................................... i Acknowledgement ........................................................................................................................................ ii List of Figures ............................................................................................................................................... v List of Tables ................................................................................................................................................ v List of Symbols ............................................................................................................................................ vi Abbreviations .............................................................................................................................................. vii Abstract ........................................................................................................................................................ ix Chapter 1. GENERAL INTRODUCTION ............................................................................................. 1 1.1 What is Cloud Computing............................................................................................................. 1 1.1.1 Characteristics of Cloud Computing ..................................................................................... 1 1.1.2 Cloud Computing Architecture ............................................................................................. 2 1.1.3 Cloud Computing Service Delivery Models ......................................................................... 4 1.1.4 Cloud Computing Deployment Models ................................................................................ 5 1.1.5 Advantages and Limitations of Cloud Computing ................................................................ 6 1.2 Data Security and Privacy ............................................................................................................. 8 1.2.1 Security Issues in Cloud Computing ..................................................................................... 8 1.3 Cryptographic Protection of Data ............................................................................................... 10 1.4 Research Motivation ................................................................................................................... 11 1.5 Contributions of this Research .................................................................................................... 12 1.6 Conclusion .................................................................................................................................. 12 Chapter 2. CRYPTOGRAPHY IN CLOUD COMPUTING ................................................................ 13 2.1 Fundamentals of Cryptography ................................................................................................... 13 2.1.1 Symmetric Cryptography .................................................................................................... 14 2.1.2 Public Key Cryptography .................................................................................................... 16 2.1.3 Public Key Infrastructure .................................................................................................... 19 2.1.4 Digital Signatures ................................................................................................................ 21 2.2 Elliptic Curve Cryptography ....................................................................................................... 22 2.3 Identity Based Cryptography ...................................................................................................... 22 2.4 Related Works ............................................................................................................................. 26 Chapter 3. METHODOLOGY AND DESIGN .................................................................................... 28 3.1 Elliptic Curves Arithmetic .......................................................................................................... 28 3.1.1 The Weierstrass equation .................................................................................................... 28 iii 3.1.2 Discriminant ........................................................................................................................ 29 3.1.3 Group Laws ......................................................................................................................... 29 3.1.4 Elliptic Curve Discrete Logarithm Problem (ECDLP) ....................................................... 31 3.2 Elliptic Curve Integrated Encryption Scheme (ECIES) .............................................................. 32 3.3 The Proposed System .................................................................................................................. 33 3.3.1 Essential parts of the proposed system................................................................................ 33 3.4 Proposed Cryptographic Schemes .............................................................................................. 39 3.5 The Proposed System Algorithms ............................................................................................... 40 3.5.1 Public and Private Key Generation Algorithm ................................................................... 41 3.5.2 File Encryption and Decryption Algorithms ....................................................................... 42 Chapter 4. SYSTEM IMPLEMENTATION AND RESULTS ............................................................ 45 4.1 Implementation ........................................................................................................................... 45 4.2 Results ......................................................................................................................................... 45 4.3 Comparison of the proposed scheme with previous works. ........................................................ 50 4.4 Comparison of Time Performance Results among RSA, mediate RSA (mRSA) and ECC/ Discussion ............................................................................................................................................... 51 Chapter 5. CONCLUSIONS AND FUTURE WORK ......................................................................... 54 5.1 Key Contributions ....................................................................................................................... 54 5.2 Future Works .............................................................................................................................. 55 Appendix A ............................................................................................................................................... 56 A 1.1 Bouncy Castle Provider................................................................................................................. 56 A 1.2 Login Interface .............................................................................................................................. 57 A 1.3 Key generation .............................................................................................................................. 57 Private Key .........................................................................................................................................