SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 32
Cloud Data Security Using Elliptic Curve Cryptography
Arockia Panimalar.S 1, Dharani.N2, Pavithra.S3, Aiswarya.R4
1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
2,3,4 III BCA, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data security is, protecting data from ill-
conceived get to, utilize, introduction, intrusion, change,
examination, recording or destruction. Cloud computing is a
sort of Internet-based computing that grants conjoint PC
handling resources and information to PCs what's more,
different gadgets according to necessity. It is a model that
empowers universal, on-request access to a mutual pool of
configurable computing resources. At present, security has
been viewed as one of the best issues in the improvement of
Cloud Computing. The key issue in effective execution of Cloud
Computing is to adequately deal with the security in the cloud
applications. This paper talks about the part of cryptography
in cloud computing to improve the data security. The
expectation here is to get bits of knowledge another security
approach with the usage of cryptography to secure
information at cloud data centers.
Key Words: Cloud Computing, Elliptical Curve
Cryptography, Cryptography
1. INTRODUCTION
Cloud computing provides a new way of services by
organizing various resources and providing them to users
based on their demands. It also plays a crucial role in the
next generation mobile networks and services (5G) and
Cyber-Physical and Social Computing (CPSC). Cloud
computing and capacity arrangements give clients and
ventures different qualities to store and process their
information in third-party data centers that might be
arranged a long way from the user running in remove from
over a city to over the world. Cloud computing counts on
sharing of resources to attain endurance and economy of
scale, similar to a utility (like the electricity grid) over an
electricity network. Storing data in the cloud greatly
decreases storage load of users and brings them access
comfort, thus it has become one of the most important cloud
services. Possibilities guarantee that, cloud computing
enables organizations to keep away from forthright
infrastructure costs (e.g. purchasing servers). Likewise, it
engages associations to focus on their core businesses
instead of investing energy and supports on computer
infrastructure. Cloud computing enablesundertakingsto get
their applications up and running speedier, with enhanced
sensibility and less maintenance. Be that as it may, concerns
are starting to create about how safe Cloud is? as more data
on people and organizations are being put in the cloud.
Disregards to all the hype surrounding the cloud, enterprise
customers are still unwilling to place their business in the
cloud. One of the real concerns which lessens the
development of Cloudcomputingissecurityandimpediment
with data security and information protection keep on
infecting the market. Cloud information storage augments
the danger of data spillage and ill-conceived get to. The
architecture of cloud poses certain dangers to thesecurityof
the existing technologies when deployed in a cloud
environment. Cloud service users need to be alert in
interpreting the risks of data intrusion in this new
environment.[1] The security concernswithrespecttocloud
computing are end-user data security, network traffic, file
systems and host machine security which can be addressed
with the help of cryptography to a considerable level.
“Security and privacy are indeed interrelated because the
security is provided without having privacy but the privacy
is not maintained without security. “[2]
What is Cryptography?
Cryptography is the art and science of assuring security by
converting information messages into non- readable ones.
The original message also referredtoasplaintextmessageis
in simple English language that can be interpreted by
everyone.
The encrypted message, obtained byapplyingcryptographic
techniques to the plain text, is called as cipher text message.
There are three types of cryptographic techniques:
1) Symmetric Key Cryptography
2) Asymmetric key cryptography
3) Hash Function Cryptography
2. LITERATURE SURVEY
1.Wang, L., Tao, J., & Kunze, M. in their research paper
“Scientific cloud computing: Earlydefinitionandexperience”
says that, Computing clouds equips users with services to
access hardware, software, and data resource. Some clouds
service models are:
i) HaaS: Hardware as a Service
Hardware as a Service was proposed possibly at 2006. As an
outgrowth of rapid advances in hardware virtualization, IT
automation and usage metering and pricing,userscouldbuy
IT hardware - or even an entiredata center/computercenter
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 33
- as a pay-as-you-go subscription service. The HaaS could be
flexible, scalable and manageable to meet your needs.
ii) SaaS: Software as a Service
Software or application is hosted as a service and provided
to customers across the Internet, which excludes the
requirement to install and run the application on the
customer’s local computer. SaaS therefore amends the
customer’s headache of software maintenance, and
decreases the expense of software purchases by on demand
pricing.
iii) DaaS: Data as a Service
Data in various formats, from various sources, could be
accessed via services to users on the network. Clients could,
for instance, control remote informationsimplylikework on
local disk or access data semantically on the Internet.
2. Er. Sharanjit Singh and Er. Rasneet Kaur Chauhan,
“Introduction to CryptoCloud in Cloud Computing“proposes
Cryptographic Algorithms as:
1) Data Encryption Standards (DES)
2) Advanced Encryption Standards (AES)
3) Triple – DES
4) RSA
5) Blowfish
These algorithms can be applied successfully in cloud
environment.
3. Nelson Gonzalez, Charles Miers, Fernando Redígolo,
Tereza Carvalho, Marcos Simplicio, Mats Näslundy and
Makan Pourzandi in their research paper, “An quantitative
analysis of current security concerns and solutionsforcloud
computing” says that aiming to organize the information
related to cloud security have identify the main problems in
the area and grouped them into a model composed of eight
categories: Compliance, Trust, Architecture, Identity and
Access, availability, incident response, data protection and
governance.
Fig.1: Security Problems in Cloud Computing Environment
3. CLOUD COMPUTING ENVIRONMENT
A) History and Definition
Cloud computing bursts as a hot topic from the late of 2007
due to its capabilities of rendering elastic propelling IT
infrastructures, QoS assured computing environments and
configurable software services [3]. The Cloud Computing
provides computing over the internet and this word is
basically inspired by the weather cloud. In cloud, data is
stored at remote location and is available on demand. It
allows clients to use application software without installing
the file at any computer locally, with internet connectivity.
By data outsourcing user can obtain the required
information from anywhere more efficiently and has no
headache of storage space and can skip the extra expenses
on software, hardware, and information resources and data
maintenance [2].
B) Current Cloud Projects
Currently numerous projects from industry and academia
have been proposed, for example, RESERVOIR project [4] -
IBM and European Union joint research initiative for Cloud
computing, Amazon Elastic Compute Cloud [5], IBM’s Blue
Cloud[6], scientific Cloud projects such as Nimbus [7] and
Stratus[8], OpenNEbula [9].
C) Classification of Clouds
Clouds may be classified broadly as:
i) Public Cloud: hosted, operated and managed by third
party vendor from one or more data centers.
ii) Private Cloud: managed or owned by an organization,
providing services within an organization.
iii) Hybrid Cloud: comprised both the private and public
cloud models where organization might run non - core
application in a public cloud, while maintaining core
applications and sensitive data in- house in a private cloud.
D) Features of Cloud Computing
i) Resource Pooling and Elasticity
In cloud computing, resources are pooled to serve a large
number of customers. Cloud computingutilizesmulti-tenure
where distinctive resources are progressively allotted and
de-assigned by request. From theclient'send,itisunrealistic
to know where the resource really resides. The resource
allocation ought to be flexible, as in it should changesuitably
and rapidly with the demand. In the event that on a specific
day the request expands a few times, atthatpointthesystem
ought to be sufficiently versatile to meet that extra require,
and should come back to the normal level when the demand
diminishes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 34
ii) Self and On-Demand Service
Cloud computing depends on self-service and on-demand
service models. It ought to enable the client to collaborate
with the cloud to perform assignments like building,
deploying, managing, and scheduling. The client ought to
have the capacity to get to figuring abilitiesasand whenthey
are required and with no association from the cloud service
provider. This would help clients to be in control, getting
deftness their work, and to settle on better choices on the
present and future needs.
iii) Broad Network Access
Capabilities are accessible over the network and got to
through standard mechanisms that advance use by
heterogeneous thin or thick client stages (e.g., cell phones,
tablets, portable PCs and workstations).
iv) Measured Services
Cloud systems consequently control what's more, upgrade
resource use by utilizing a metering ability at some level of
reflection proper to the type of service (e.g. storagecapacity,
processing, transmission capacity and active client
accounts). Resource utilization can be monitored,controlled
and reported,givingstraightforwardnesstothe provider and
consumer.
v) Rapid Flexibility
Capabilities can be flexibly provisioned anddischarged,now
and again naturally, proportional quickly outward and
internal proportionate with demand. To the customer, the
capacities accessible for provisioning regularly have all the
earmarks of being boundless and can be appropriatedinany
quantity whenever.
E) Cloud Computing Entities
Figure shows the cloud computing entities:
Fig: Cloud Computing Entities
i)Cloud Consumer: One who uses a cloud provider's
resources, from a company to an individual.
ii) Cloud Auditor: The goal of Cloud Audit is to provide
cloud service providers with a way to make their
performance and security data readilyavailableforpotential
customers.
iii)Cloud Broker: the Service brokers concentrate on the
negotiation of the relationships between consumers and
providers. There are two major roles for brokers: SLA
Negotiation and VM Monitor. The SLA Manager takes care
that no Service Level Agreement (SLA) is violated and VM
Monitor the current stated of virtual machines periodically
at specific amount of time[2].
iv)Cloud Provider: The Company who makes the cloud
available to others. They are in charge of maintenance/
upkeep of the cloud and, of course, making sure it is always
available to the cloud user.
4.ROLEOFCRYPTOGRAPHYINCLOUDCOMPUTING
A) Introduction to Cryptography
Cryptography is the technique widely used in computer
networks to provide security to the data and messages
communicated over the network. The plain text message
being sent from sender is encrypted in to a special format
called as “Cipher Text” by applying some cryptographic
algorithm and then communicated over the network. At the
receiver’s end, the Cipher text message is decrypted in the
original plain text again by applying some decryption
algorithm. Thus only the sender & receiver of the
communication can read the encoded message and no one
else. Cryptography is used for addressing the network
security problems.
i. Data Integrity: Information has value only if it is correct,
this refers to maintaining and assuring the accuracy and
consistency of data, its implementation for computer
systems that store use data, processes, or retrieve that data.
ii.Authentication: Determining whom we are talking to
before revealing the sensitive information or entering into a
business deal.
iii.Non Repudiation: Deals with signatures and is the
assurance that a party, contract or someone cannotdenythe
authenticity of their signature and sending a message that
they originated.
iv.Secrecy: Keeping information out of the hands of
unauthorized users, relates to loss of privacy, identity theft.
B. Cryptographic Model
The following figure helps to understand the basic idea of
cryptography.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 35
Fig: Cryptographic Model
i) Plaintext is the original source information or data thatis
input to algorithms.
ii)Cipher text is the scrambled message output as random
stream of unintelligible data.
iii)Encryption Algorithm substitutes and performs
permutations on plain text to cipher text.
iv)Decryption Algorithm is encryption run in reverse by
taking the secret key and transforming the cipher text to
produce the original plain text.
v)Keys are used as input for encryption or decryption and
determines the transformation.
vi)Sender and Recipient are persons who are
communicating and sharing the plaintext.
C) Classification of Security Algorithms
i) Private Key/ Symmetric Algorithms: These algorithms
use a single secret key that is known to the sender and
receiver.
E.g. RC6, AES, 3DES, IDEA, Blowfish.
ii) Public Key/ Asymmetric Algorithms: Use a key pairfor
cryptographic process, with public key for encryption and
private key for decryption
E.g. RSA, Diffie Hellman
D) Security Issues that arise in the Cloud
Security issues in cloud fall into two general classes:security
issues confronted by cloud providers (associations giving
programming,platform,orframework as-a-benefitbymeans
of the cloud) and security issues confronted by their clients
(organizations or associations who have applications or
store data on the cloud)[15].
i) Guaranteeing Data isolation
In order to optimize resources, cut costs, and maintain
efficiency, Cloud Service Providersstore multiplecustomers’
data on the same server. This leads to a chance that user's
private data can be viewed by each other. To avoid such
sensitive situations, cloud service providers must ensure
proper data isolation and logical storage separation.
ii)Guaranteeing Secure Data Transfer
In a Cloud environment, the physical location and reach are
out of control of the end user, where the resources are
hosted.
iii) Ensuring Secure Interface
In the unsecure internet environment the integrity of
information during transfer, storage and retrieval needs to
be ensured.
iv) Security of Stored Data
The issue of controlling the encryption and decryption by
either the end user or the Cloud Service provider is still
doubtful.
v) User Access Control
Web data logs are needed to be provided to compliance
auditors and security managers for web based transactions
(PCI DSS).
In the referenced research work, a security framework has
been proposed for cloudcomputingtoassureconfidentiality,
integrity and authentication criteria using symmetric and
asymmetric cryptographic algorithms. But there are still
some problem areas observed in this work listed as
follows[10]:
->No any strong valid authentication scheme had been
proposed or implemented yet.
->Security criteria of Serverstoragehadnotbeenconsidered
in case of client-server interaction.
->The proposed framework is Weak and less secure (as
concatenations tends to be more vulnerable to brute-force
attacks).
-> Security factors which are Randomness related, had been
completely neglected.
->This framework is not completely suitable for highly
confidential data (related to banking, defense and other
brokerage related applications).
5.Elliptical Curve Cryptography in Cloud
Computing
Elliptic Curve Cryptography (ECC) is effectively used as a
touch of preparing to instantiate public key cryptography
conventions, for instance executing keys and digital
signatures. There are diverse motivations behind energy of
using elliptic bends as they offer more little key sizes and
more possible executions [11].
ECC is a kind of open cryptosystem like RSA. Be that as it
may, its snappier advancing limit and by giving appealing
and option approach to specialists of cryptographic
calculation influences it to contrast from RSA. A similar
security level gave by RSA, can be additionally given by ECC,
that likewise with littler key sizes. For example, the 1024 bit
security strength of a RSA could be reduced to 163 bit
security strength of ECC with the same level.Apartfromthis,
ECC is especially well suited for wireless communications,
like mobile phones, PDAs, smart cards and sensor networks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 36
ECC uses point of multiplication operation, which has been
found to be computationally more efficient than RSA
exponentiation[12].
ECC has drawn much attention as the security solutions for
wireless networks such as Clouds, due to the small key size
and simplified computation [13]. Elliptic curve has a unique
property that makes it fit for use in cryptography in cloud
computing i.e. its power to take any two points on a specific
curve, add them together and get a third point on the same
curve. The fundamental operation engagedwithECCispoint
multiplication, i.e. increase of a scalar K with any guide P on
the curve toward get another point Q on the samecurve[14].
The general equation for an elliptic curve is:
y2 + axy + by = x3 + cx2 + dx + e
Where a, b, c, d and e are real numbers and x and y belongs
to a set of real number. In its simplest form, an elliptic curve
equation can be given as:
y2 – x8 + dx + e
6. ANALYSIS
A Statistical investigation, demonstrates that a similar level
of security rendered by a RSA-based framework with a huge
modulus can be proficient with a considerably smaller
elliptic curve group, i.e. a 163 piece key of ECC is thought to
be as secure as 1024 bits key in RSA. Also ECC uses smaller
key sizes, which effects in faster calculations, lower power
consumptions, saving memory and bandwidth. ECC thus
clubbed with Cloud computing will definitely provide much
more secure environment along with speed and saving of
many intangible/indirect resources. ECC applied in cloud
will result in more attention paid towards how to avoid data
duplications, how to utilize data and services efficiently and
how to achieve cost-effective solutions.
7. CONCLUSION AND FUTURE ENHANCEMENT
Cloud Computing is utilized for service-based architecture.
To plough on cloud computing, the community must take
sincere and dedicated measures to ensure security. A
movement continues to adopt universal standards (for
example, open source) to ensure interoperability among
service providers.
ECC can be utilized as a part of mobile computing, remote
sensor systems, server based encryption, image encryption
and its application in each field of communication. Cloud
computing with ECC is a totally new area and has colossal
extent of research. The concern here is data security with
Elliptic curve cryptography to give secrecyandconfirmation
of data between clouds. In future, security issues of cloud
computing can be focused more and an attempt canbemade
to discover better solutions utilizing Elliptical Curve
Cryptography.
8. REFERENCES
[1]S. Subashini, V. Kavitha -Anna University Tirunelveli,
India,” A survey on security issues inservicedeliverymodels
of cloud computing“ELSEVIER- Journal of Network and
Computer Applications Volume 34, Issue 1, January 2011,
Pages 1–11.
[2]Jashanpreet Pal Kaur, Rajbhupinder kaur, Yadavindra
College of Engineering, Talwandi Sabo, Bathinda Punjab,
“Security Issues and Use of Cryptography in Cloud
Computing" International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 4,
Issue 7, July 2014, ISSN: 2277 128X.
[3] Wang, L., Tao, J., & Kunze, M. (2008). “Scientific cloud
computing: Early definition and experience”. Proceedings of
the 10th IEEEInternational ConferenceonHighPerformance
Computing and Communications, Austin, TX, 825–830.
[4]Reservoir Project [URL]. http://www-03.ibm.com/
press/us/en/pressrelease/23448.wss/,accessonJune2008.
[5]Amazon Elastic Compute Cloud [URL]. http://aws.
amazon. com/ ec2, access on Nov. 2007.
[6]IBM Blue Cloud project [URL]. http://www-
3.ibm.com/press /us/en/pressrelease/22613.wss/, access
on June 2008.
[7]Nimbus Project [URL].http://workspace.globus.org/
clouds/nimbus.html/,access on June 2008.
[8]Status Project [URL]. http://www.acis.ufl.edu/vws/,
access on June 2008.
[9]OpenNEbula Project[URL].http://www.opennebula.org/,
access on Apr.2008.
[10]Shweta Sharma, Bharat Bhushan, Shalini Sharma -
”Improvising Information Security in Cloud Computing
Environment”- International Journal of Computer
Applications (0975 – 8887) Volume 86 – No 16, January
2014.
[11]D. J. Bernstein and T. Lange (editors). eBACS: ECRYPT
Benchmarking of Cryptographic Systems, http://bench.
crypto, October 2013.
[12]Dr.R.Shanmugalakshmi, M.Prabu – “Research Issues on
Elliptic Curve Cryptography and Its applications”- IJCSNS
International Journal of Computer Science and Network
Security, VOL.9 No.6, June 2009.
[13] Wang, H., Sheng, B. and Li, Q. (2006) ‘Elliptic curve
cryptographybased access control in sensornetworks’,Int.J.
Security and Networks,Vol. 1, Nos. 3/4, pp.127–137.
[14] Ms Bhavana Sharma, B.P.I.T., Rohini, Delhi-“security
architecture of cloud computing based on elliptic curve
cryptography (ecc)” ICETEM 2013.
[15] Wikipedia, the free encyclopedia of Cloud Computing.

Mais conteúdo relacionado

Mais procurados

IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemSecuring iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemCSCJournals
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyIRJET Journal
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 

Mais procurados (20)

IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
19_2
19_219_2
19_2
 
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemSecuring iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A survey
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 

Semelhante a Cloud Data Security using Elliptic Curve Cryptography

Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Science international journal
Science international journalScience international journal
Science international journalSarita30844
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
 

Semelhante a Cloud Data Security using Elliptic Curve Cryptography (20)

Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
C017421624
C017421624C017421624
C017421624
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Science international journal
Science international journalScience international journal
Science international journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Último (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Cloud Data Security using Elliptic Curve Cryptography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 32 Cloud Data Security Using Elliptic Curve Cryptography Arockia Panimalar.S 1, Dharani.N2, Pavithra.S3, Aiswarya.R4 1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India 2,3,4 III BCA, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue in effective execution of Cloud Computing is to adequately deal with the security in the cloud applications. This paper talks about the part of cryptography in cloud computing to improve the data security. The expectation here is to get bits of knowledge another security approach with the usage of cryptography to secure information at cloud data centers. Key Words: Cloud Computing, Elliptical Curve Cryptography, Cryptography 1. INTRODUCTION Cloud computing provides a new way of services by organizing various resources and providing them to users based on their demands. It also plays a crucial role in the next generation mobile networks and services (5G) and Cyber-Physical and Social Computing (CPSC). Cloud computing and capacity arrangements give clients and ventures different qualities to store and process their information in third-party data centers that might be arranged a long way from the user running in remove from over a city to over the world. Cloud computing counts on sharing of resources to attain endurance and economy of scale, similar to a utility (like the electricity grid) over an electricity network. Storing data in the cloud greatly decreases storage load of users and brings them access comfort, thus it has become one of the most important cloud services. Possibilities guarantee that, cloud computing enables organizations to keep away from forthright infrastructure costs (e.g. purchasing servers). Likewise, it engages associations to focus on their core businesses instead of investing energy and supports on computer infrastructure. Cloud computing enablesundertakingsto get their applications up and running speedier, with enhanced sensibility and less maintenance. Be that as it may, concerns are starting to create about how safe Cloud is? as more data on people and organizations are being put in the cloud. Disregards to all the hype surrounding the cloud, enterprise customers are still unwilling to place their business in the cloud. One of the real concerns which lessens the development of Cloudcomputingissecurityandimpediment with data security and information protection keep on infecting the market. Cloud information storage augments the danger of data spillage and ill-conceived get to. The architecture of cloud poses certain dangers to thesecurityof the existing technologies when deployed in a cloud environment. Cloud service users need to be alert in interpreting the risks of data intrusion in this new environment.[1] The security concernswithrespecttocloud computing are end-user data security, network traffic, file systems and host machine security which can be addressed with the help of cryptography to a considerable level. “Security and privacy are indeed interrelated because the security is provided without having privacy but the privacy is not maintained without security. “[2] What is Cryptography? Cryptography is the art and science of assuring security by converting information messages into non- readable ones. The original message also referredtoasplaintextmessageis in simple English language that can be interpreted by everyone. The encrypted message, obtained byapplyingcryptographic techniques to the plain text, is called as cipher text message. There are three types of cryptographic techniques: 1) Symmetric Key Cryptography 2) Asymmetric key cryptography 3) Hash Function Cryptography 2. LITERATURE SURVEY 1.Wang, L., Tao, J., & Kunze, M. in their research paper “Scientific cloud computing: Earlydefinitionandexperience” says that, Computing clouds equips users with services to access hardware, software, and data resource. Some clouds service models are: i) HaaS: Hardware as a Service Hardware as a Service was proposed possibly at 2006. As an outgrowth of rapid advances in hardware virtualization, IT automation and usage metering and pricing,userscouldbuy IT hardware - or even an entiredata center/computercenter
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 33 - as a pay-as-you-go subscription service. The HaaS could be flexible, scalable and manageable to meet your needs. ii) SaaS: Software as a Service Software or application is hosted as a service and provided to customers across the Internet, which excludes the requirement to install and run the application on the customer’s local computer. SaaS therefore amends the customer’s headache of software maintenance, and decreases the expense of software purchases by on demand pricing. iii) DaaS: Data as a Service Data in various formats, from various sources, could be accessed via services to users on the network. Clients could, for instance, control remote informationsimplylikework on local disk or access data semantically on the Internet. 2. Er. Sharanjit Singh and Er. Rasneet Kaur Chauhan, “Introduction to CryptoCloud in Cloud Computing“proposes Cryptographic Algorithms as: 1) Data Encryption Standards (DES) 2) Advanced Encryption Standards (AES) 3) Triple – DES 4) RSA 5) Blowfish These algorithms can be applied successfully in cloud environment. 3. Nelson Gonzalez, Charles Miers, Fernando Redígolo, Tereza Carvalho, Marcos Simplicio, Mats Näslundy and Makan Pourzandi in their research paper, “An quantitative analysis of current security concerns and solutionsforcloud computing” says that aiming to organize the information related to cloud security have identify the main problems in the area and grouped them into a model composed of eight categories: Compliance, Trust, Architecture, Identity and Access, availability, incident response, data protection and governance. Fig.1: Security Problems in Cloud Computing Environment 3. CLOUD COMPUTING ENVIRONMENT A) History and Definition Cloud computing bursts as a hot topic from the late of 2007 due to its capabilities of rendering elastic propelling IT infrastructures, QoS assured computing environments and configurable software services [3]. The Cloud Computing provides computing over the internet and this word is basically inspired by the weather cloud. In cloud, data is stored at remote location and is available on demand. It allows clients to use application software without installing the file at any computer locally, with internet connectivity. By data outsourcing user can obtain the required information from anywhere more efficiently and has no headache of storage space and can skip the extra expenses on software, hardware, and information resources and data maintenance [2]. B) Current Cloud Projects Currently numerous projects from industry and academia have been proposed, for example, RESERVOIR project [4] - IBM and European Union joint research initiative for Cloud computing, Amazon Elastic Compute Cloud [5], IBM’s Blue Cloud[6], scientific Cloud projects such as Nimbus [7] and Stratus[8], OpenNEbula [9]. C) Classification of Clouds Clouds may be classified broadly as: i) Public Cloud: hosted, operated and managed by third party vendor from one or more data centers. ii) Private Cloud: managed or owned by an organization, providing services within an organization. iii) Hybrid Cloud: comprised both the private and public cloud models where organization might run non - core application in a public cloud, while maintaining core applications and sensitive data in- house in a private cloud. D) Features of Cloud Computing i) Resource Pooling and Elasticity In cloud computing, resources are pooled to serve a large number of customers. Cloud computingutilizesmulti-tenure where distinctive resources are progressively allotted and de-assigned by request. From theclient'send,itisunrealistic to know where the resource really resides. The resource allocation ought to be flexible, as in it should changesuitably and rapidly with the demand. In the event that on a specific day the request expands a few times, atthatpointthesystem ought to be sufficiently versatile to meet that extra require, and should come back to the normal level when the demand diminishes.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 34 ii) Self and On-Demand Service Cloud computing depends on self-service and on-demand service models. It ought to enable the client to collaborate with the cloud to perform assignments like building, deploying, managing, and scheduling. The client ought to have the capacity to get to figuring abilitiesasand whenthey are required and with no association from the cloud service provider. This would help clients to be in control, getting deftness their work, and to settle on better choices on the present and future needs. iii) Broad Network Access Capabilities are accessible over the network and got to through standard mechanisms that advance use by heterogeneous thin or thick client stages (e.g., cell phones, tablets, portable PCs and workstations). iv) Measured Services Cloud systems consequently control what's more, upgrade resource use by utilizing a metering ability at some level of reflection proper to the type of service (e.g. storagecapacity, processing, transmission capacity and active client accounts). Resource utilization can be monitored,controlled and reported,givingstraightforwardnesstothe provider and consumer. v) Rapid Flexibility Capabilities can be flexibly provisioned anddischarged,now and again naturally, proportional quickly outward and internal proportionate with demand. To the customer, the capacities accessible for provisioning regularly have all the earmarks of being boundless and can be appropriatedinany quantity whenever. E) Cloud Computing Entities Figure shows the cloud computing entities: Fig: Cloud Computing Entities i)Cloud Consumer: One who uses a cloud provider's resources, from a company to an individual. ii) Cloud Auditor: The goal of Cloud Audit is to provide cloud service providers with a way to make their performance and security data readilyavailableforpotential customers. iii)Cloud Broker: the Service brokers concentrate on the negotiation of the relationships between consumers and providers. There are two major roles for brokers: SLA Negotiation and VM Monitor. The SLA Manager takes care that no Service Level Agreement (SLA) is violated and VM Monitor the current stated of virtual machines periodically at specific amount of time[2]. iv)Cloud Provider: The Company who makes the cloud available to others. They are in charge of maintenance/ upkeep of the cloud and, of course, making sure it is always available to the cloud user. 4.ROLEOFCRYPTOGRAPHYINCLOUDCOMPUTING A) Introduction to Cryptography Cryptography is the technique widely used in computer networks to provide security to the data and messages communicated over the network. The plain text message being sent from sender is encrypted in to a special format called as “Cipher Text” by applying some cryptographic algorithm and then communicated over the network. At the receiver’s end, the Cipher text message is decrypted in the original plain text again by applying some decryption algorithm. Thus only the sender & receiver of the communication can read the encoded message and no one else. Cryptography is used for addressing the network security problems. i. Data Integrity: Information has value only if it is correct, this refers to maintaining and assuring the accuracy and consistency of data, its implementation for computer systems that store use data, processes, or retrieve that data. ii.Authentication: Determining whom we are talking to before revealing the sensitive information or entering into a business deal. iii.Non Repudiation: Deals with signatures and is the assurance that a party, contract or someone cannotdenythe authenticity of their signature and sending a message that they originated. iv.Secrecy: Keeping information out of the hands of unauthorized users, relates to loss of privacy, identity theft. B. Cryptographic Model The following figure helps to understand the basic idea of cryptography.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 35 Fig: Cryptographic Model i) Plaintext is the original source information or data thatis input to algorithms. ii)Cipher text is the scrambled message output as random stream of unintelligible data. iii)Encryption Algorithm substitutes and performs permutations on plain text to cipher text. iv)Decryption Algorithm is encryption run in reverse by taking the secret key and transforming the cipher text to produce the original plain text. v)Keys are used as input for encryption or decryption and determines the transformation. vi)Sender and Recipient are persons who are communicating and sharing the plaintext. C) Classification of Security Algorithms i) Private Key/ Symmetric Algorithms: These algorithms use a single secret key that is known to the sender and receiver. E.g. RC6, AES, 3DES, IDEA, Blowfish. ii) Public Key/ Asymmetric Algorithms: Use a key pairfor cryptographic process, with public key for encryption and private key for decryption E.g. RSA, Diffie Hellman D) Security Issues that arise in the Cloud Security issues in cloud fall into two general classes:security issues confronted by cloud providers (associations giving programming,platform,orframework as-a-benefitbymeans of the cloud) and security issues confronted by their clients (organizations or associations who have applications or store data on the cloud)[15]. i) Guaranteeing Data isolation In order to optimize resources, cut costs, and maintain efficiency, Cloud Service Providersstore multiplecustomers’ data on the same server. This leads to a chance that user's private data can be viewed by each other. To avoid such sensitive situations, cloud service providers must ensure proper data isolation and logical storage separation. ii)Guaranteeing Secure Data Transfer In a Cloud environment, the physical location and reach are out of control of the end user, where the resources are hosted. iii) Ensuring Secure Interface In the unsecure internet environment the integrity of information during transfer, storage and retrieval needs to be ensured. iv) Security of Stored Data The issue of controlling the encryption and decryption by either the end user or the Cloud Service provider is still doubtful. v) User Access Control Web data logs are needed to be provided to compliance auditors and security managers for web based transactions (PCI DSS). In the referenced research work, a security framework has been proposed for cloudcomputingtoassureconfidentiality, integrity and authentication criteria using symmetric and asymmetric cryptographic algorithms. But there are still some problem areas observed in this work listed as follows[10]: ->No any strong valid authentication scheme had been proposed or implemented yet. ->Security criteria of Serverstoragehadnotbeenconsidered in case of client-server interaction. ->The proposed framework is Weak and less secure (as concatenations tends to be more vulnerable to brute-force attacks). -> Security factors which are Randomness related, had been completely neglected. ->This framework is not completely suitable for highly confidential data (related to banking, defense and other brokerage related applications). 5.Elliptical Curve Cryptography in Cloud Computing Elliptic Curve Cryptography (ECC) is effectively used as a touch of preparing to instantiate public key cryptography conventions, for instance executing keys and digital signatures. There are diverse motivations behind energy of using elliptic bends as they offer more little key sizes and more possible executions [11]. ECC is a kind of open cryptosystem like RSA. Be that as it may, its snappier advancing limit and by giving appealing and option approach to specialists of cryptographic calculation influences it to contrast from RSA. A similar security level gave by RSA, can be additionally given by ECC, that likewise with littler key sizes. For example, the 1024 bit security strength of a RSA could be reduced to 163 bit security strength of ECC with the same level.Apartfromthis, ECC is especially well suited for wireless communications, like mobile phones, PDAs, smart cards and sensor networks.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 36 ECC uses point of multiplication operation, which has been found to be computationally more efficient than RSA exponentiation[12]. ECC has drawn much attention as the security solutions for wireless networks such as Clouds, due to the small key size and simplified computation [13]. Elliptic curve has a unique property that makes it fit for use in cryptography in cloud computing i.e. its power to take any two points on a specific curve, add them together and get a third point on the same curve. The fundamental operation engagedwithECCispoint multiplication, i.e. increase of a scalar K with any guide P on the curve toward get another point Q on the samecurve[14]. The general equation for an elliptic curve is: y2 + axy + by = x3 + cx2 + dx + e Where a, b, c, d and e are real numbers and x and y belongs to a set of real number. In its simplest form, an elliptic curve equation can be given as: y2 – x8 + dx + e 6. ANALYSIS A Statistical investigation, demonstrates that a similar level of security rendered by a RSA-based framework with a huge modulus can be proficient with a considerably smaller elliptic curve group, i.e. a 163 piece key of ECC is thought to be as secure as 1024 bits key in RSA. Also ECC uses smaller key sizes, which effects in faster calculations, lower power consumptions, saving memory and bandwidth. ECC thus clubbed with Cloud computing will definitely provide much more secure environment along with speed and saving of many intangible/indirect resources. ECC applied in cloud will result in more attention paid towards how to avoid data duplications, how to utilize data and services efficiently and how to achieve cost-effective solutions. 7. CONCLUSION AND FUTURE ENHANCEMENT Cloud Computing is utilized for service-based architecture. To plough on cloud computing, the community must take sincere and dedicated measures to ensure security. A movement continues to adopt universal standards (for example, open source) to ensure interoperability among service providers. ECC can be utilized as a part of mobile computing, remote sensor systems, server based encryption, image encryption and its application in each field of communication. Cloud computing with ECC is a totally new area and has colossal extent of research. The concern here is data security with Elliptic curve cryptography to give secrecyandconfirmation of data between clouds. In future, security issues of cloud computing can be focused more and an attempt canbemade to discover better solutions utilizing Elliptical Curve Cryptography. 8. REFERENCES [1]S. Subashini, V. Kavitha -Anna University Tirunelveli, India,” A survey on security issues inservicedeliverymodels of cloud computing“ELSEVIER- Journal of Network and Computer Applications Volume 34, Issue 1, January 2011, Pages 1–11. [2]Jashanpreet Pal Kaur, Rajbhupinder kaur, Yadavindra College of Engineering, Talwandi Sabo, Bathinda Punjab, “Security Issues and Use of Cryptography in Cloud Computing" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 7, July 2014, ISSN: 2277 128X. [3] Wang, L., Tao, J., & Kunze, M. (2008). “Scientific cloud computing: Early definition and experience”. Proceedings of the 10th IEEEInternational ConferenceonHighPerformance Computing and Communications, Austin, TX, 825–830. [4]Reservoir Project [URL]. http://www-03.ibm.com/ press/us/en/pressrelease/23448.wss/,accessonJune2008. [5]Amazon Elastic Compute Cloud [URL]. http://aws. amazon. com/ ec2, access on Nov. 2007. [6]IBM Blue Cloud project [URL]. http://www- 3.ibm.com/press /us/en/pressrelease/22613.wss/, access on June 2008. [7]Nimbus Project [URL].http://workspace.globus.org/ clouds/nimbus.html/,access on June 2008. [8]Status Project [URL]. http://www.acis.ufl.edu/vws/, access on June 2008. [9]OpenNEbula Project[URL].http://www.opennebula.org/, access on Apr.2008. [10]Shweta Sharma, Bharat Bhushan, Shalini Sharma - ”Improvising Information Security in Cloud Computing Environment”- International Journal of Computer Applications (0975 – 8887) Volume 86 – No 16, January 2014. [11]D. J. Bernstein and T. Lange (editors). eBACS: ECRYPT Benchmarking of Cryptographic Systems, http://bench. crypto, October 2013. [12]Dr.R.Shanmugalakshmi, M.Prabu – “Research Issues on Elliptic Curve Cryptography and Its applications”- IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.6, June 2009. [13] Wang, H., Sheng, B. and Li, Q. (2006) ‘Elliptic curve cryptographybased access control in sensornetworks’,Int.J. Security and Networks,Vol. 1, Nos. 3/4, pp.127–137. [14] Ms Bhavana Sharma, B.P.I.T., Rohini, Delhi-“security architecture of cloud computing based on elliptic curve cryptography (ecc)” ICETEM 2013. [15] Wikipedia, the free encyclopedia of Cloud Computing.