CFP last date
20 May 2024
Reseach Article

Cloud Computing Security Framework based on Elliptical Curve

by Ayman Helmy Mohamed, Aliaa A.a. Youssif, Atef Z. Ghalwash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 15
Year of Publication: 2015
Authors: Ayman Helmy Mohamed, Aliaa A.a. Youssif, Atef Z. Ghalwash
10.5120/19395-1069

Ayman Helmy Mohamed, Aliaa A.a. Youssif, Atef Z. Ghalwash . Cloud Computing Security Framework based on Elliptical Curve. International Journal of Computer Applications. 110, 15 ( January 2015), 45-51. DOI=10.5120/19395-1069

@article{ 10.5120/19395-1069,
author = { Ayman Helmy Mohamed, Aliaa A.a. Youssif, Atef Z. Ghalwash },
title = { Cloud Computing Security Framework based on Elliptical Curve },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 15 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 45-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number15/19395-1069/ },
doi = { 10.5120/19395-1069 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:46:28.118369+05:30
%A Ayman Helmy Mohamed
%A Aliaa A.a. Youssif
%A Atef Z. Ghalwash
%T Cloud Computing Security Framework based on Elliptical Curve
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 15
%P 45-51
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture that employ dynamic load and access balancing. Cloud computing is technology where the clients' can use high end services in form of software that reside on different servers and access data from all over the world. With a promising technology like this, it certainly abandons clients' privacy, management of data and services, putting new security threats towards the assurance of data in cloud. However, there are some security concerns when clients handle and share data in the cloud-computing environment. The security threats such as maintenance of data integrity, data hiding and data safety dominate clients concerns when the issues of cloud security come up. The big data and time-consuming encryption calculations related to applying any encryption method have proved as a hindrance in this field. Cryptography is knowledge of protecting the information for providing encryption techniques In this paper, Cloud computing security framework was tested. The framework ensures a trusted cloud environment that controlled by both the client and the cloud environment. The proposed solution secures the movement of data between client and cloud end. the non-breakability of ElGamal based on Elliptic curve cryptography for data encryption/decryption was used along with Diffie Hellman based on elliptic curve mechanism for connection establishment, The data integrity verification is done by introducing a message digest tag for updating data based on SHA-256. The proposed encryption mechanism uses the combination of elliptical cryptography and SHA-256 methods.

References
  1. Alowolodu O. D, Alese B. K, Adetunmbi A. O. , Adewale O. S, Ogundele O. S. , " Elliptic Curve Cryptography for Securing Cloud Computing Applications", International Journal of Computer Applications (0975 – 8887), Volume 66– No. 23, March 2013.
  2. Vipul Patel, Rahul Kumar, and Ankur Raj, "Improving Security and Integrity of Data Storage in Cloud Computing By Using Homomorphic Authentication technique", International Journal of Innovations in Engineering and Technology (IJIET), Vol. 3 Issue 2 December 2013
  3. R. Balaji, N. Karthick Gowtham, "Elliptic Curve Cryptography in Cloud Architectures With Lower Latency", Proceedings of International Conference On Global Innovations In Computing Technology (ICGICT'14), 2014
  4. Mohamed Al Morsy, John Grundy and Ingo Müller, "An Analysis of The Cloud Computing Security Problem", In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010
  5. Xiao-Yong l11, Li-Tao Zhou2,Yong Shi1, Yu Guo, "A trusted computing environment model in cloud architecture ", Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, 11-14 July 2010
  6. Neha Tirthani, Ganesan R, " Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography", IACR Cryptology, 2014
  7. Aarti P Pimpalkar, Prof. H. A. Hingoliwala, " A Secure Cloud Storage System with Secure Data Forwarding", International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013
  8. Mr. Pragnesh G. Patel, Mr. S. M. Shah, "Data Security in Cloud Computing using Elliptical Curve Cryptography", International Research Journal of Computer Science Engineering and Applications, Vol 2 Issue 7 July 2013
  9. Prof Swarnalata Bollavarapu, Bharat Gupta, "Data Security in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014
  10. Ms. Ritu Patidar, 2 Mrs. Rupali Bhartiya, "Implementation of Modified RSA Cryptosystem Based on Offline Storage and Prime Number", IJCAT International Journal of Computing and Technology, Volume 1, Issue 2, March 2014
  11. Abhuday Tripathi, Parul Yadav, "Enhancing Security of Cloud Computing using Elliptic Curve Cryptography", International Journal of Computer Applications (0975 – 8887), Volume 57– No. 1, November 2012
  12. Nagesh M. Wankhade, Kiran A. Sahare, Prof. Vaishali G. Bhujade, "SECURE CLOUD SIMULATION USING TRIPLE DES ", International Journal of Research in Advent Technology, Volume 2, Issue 1, January 2014
  13. S. Sathish, D. Sumathi, P. Sivaprakash, " Security Services using ECDSA in Cloud Computing", Volume 4, Issue 5, May 2014
  14. Martin Leslie. Elliptic curve cryptography. (An ECC research project), 2006.
  15. Padma Bh, D. Chandravathi , P. Prapoorna Roja, "Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method ", International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, 1904-1907
  16. Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi, "Data Security in Cloud Computing with Elliptic Curve Cryptography", International Journal of Soft Computing and Engineering (IJSCE), Volume-2, Issue-3, July 2012
Index Terms

Computer Science
Information Sciences

Keywords

cloud computing Elliptic curve Diffie Hellman based on Elliptic curve cloud storage Security cryptography ElGamal hash256 ECDSA DSA.