Data Protection Using Elliptic Curve Cryptography
Keywords:
Cloud Computing, Security, Algorithm, Elliptic Curve, Challenges, Encryption, DecryptionAbstract
Cloud computing is a network-based service that provide sharing of resources such as virtual machine, storage, network, software and applications etc. It helps to reduce capital costs since that cloud users only need to rent resources according to their requirements and pay the services they use. It is very flexible since users can access its service in any place through intranet. However, a variety of security concerns such as integrity, availability and privacy act as barriers for cloud users to adopt the cloud service. Among all of these concerns, security of data is key concern holding back cloud adoption for individual or companies. The main purpose of this paper will introduce a method to protect data by using Elliptic Curve cryptography algorithm, how this algorithm works, and using ECC in data security of cloud computing.
References
[1] L. Kleinrock, “A Vision for the Internet”, ST Journal of Research, 2(1):4-5, Nov, 2005.
[2] Mell, Peter, and Timothy Grance, "The NIST definition of cloud computing (draft)," NIST special publication vol.800, 2011.pp 145.
[3] P. Siani. "Privacy, security and trust in cloud computing." Privacy and Security for Cloud Computing. Springer London, 2013. pp3-42.
[4] H.Jian, Z. . “Analysis and Application of Consumer Features with Cloud Computing and Data Mining Technology.” In Intelligent Computation Technology and Automation, 7th International Conference ICICTA, Oct 2014 ,pp. 84-87.
[5] B. Rajiv R and M.Nitin."Cloud Computing A CRM Service Based On Separateencryption And Decryption Using Blowfish Algorithm." computing, vol.1, pp. 11.
[6] Aye Aye Thu, “Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment”,International Journal of Computer Applications,Vol. 67– No.4, 2013.
[7] VinayakShukla,ShobhitSrivastava, Nidheesh Sharma, “Cloud Computing: Security Issues and Solutions”,International Journal of Emerging Trends & Technology in Computer Science,Vol.3, Issue 5, 2014. [10]Mitchell Cochran,Paul D. Witman, “Governance And Service Level Agreement Issues In A Cloud Computing Environment”,Journal of Information Technology Management, Vol. XXII, Number 2, 2011.
[8] Grispos, G., Glisson, W.B., and Storer, T., “Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization”, 21st European Conference on Information Systems, 5-8, 2013.
[9] BijayalaxmiPurohit,PawanPrakash Singh, “Data leakage analysis on cloud computing”,International Journal of Engineering Research and Applications,Vol. 3, Issue 3, 2013.
[10] V. Shobana, M. Shanmugasundaram, “Data Leakage Detection Using Cloud Computing”,International Journal of Emerging Technology and Advanced Engineering, Vol.3, Special Issue 1, 2013.
[11] Manas M N, Nagalakshmi C K, Shobha G, “Cloud Computing Security Issues And Methods to Overcome”,International Journal of Advanced Research in Computer and Communication Engineering,Vol. 3, Issue 4, 2014.
[12] Tomoyoshi Takebayashi, Hiroshi Tsuda, TakayukiHasebe, RyusukeMasuoka, “Data Loss Prevention Technologies”, FUJITSU Sci. Tech, vol.46, No.1, PP 47-55, 2010.
[13] Certicom, Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Version 1.0, September 2000, Available at http://www.secg.org/download/aid-385/sec1_final.pdf
[14] Certicom, Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0, September 2000, Available at http://www.secg.org/download/aid-386/sec2_final.pdf
[15] Darrel Hankerson, Alfred Menezes and Scott Vanstone, Guide to Elliptic Curve Cryptography, Springer (2004).
[16] Lawrence C. Washington, Elliptic Curves Number Theory and Cryptography, Taylor & Francis Group, Second Edition (2008).
[17] Jorko Teeriaho, Cyclic Group Cryptography with Elliptic Curves, Brasov, May (2011).
[18] S.Maria Celestin Vigila and K. Muneeswaran, Implementation of Text based Cryptosystem using Elliptic Curve Cryptography, International Conference on Advanced Computing, IEEE, pp. 82–85, December (2009).
[19] D. Sravana Kumar, Ch. Suneetha and A. Chandrasekhar, Encryption of Data Using Elliptic Curve Over Finite Fields, International Journal of Distributed and Parallel Systems (IJDPS), vol. 3, no. 1, January (2012).
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
