Hyper Elliptic Curve Cryptography (HECC) to Ensure Data Security in the Cloud

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In today’s technological world, cloud computing is emerging as a trendsetting information technology service for storing data and resources and retrieving them from the Internet rather than direct server connection. This technology also enables users to save them in a remote database. But the main concern with this technology is about the security of data stored in the cloud. Since users rely on third party services for data storage, they are highly vulnerable to attacks and data exploitation. Cloud services offer a multitude of security tools to safeguard user data but they face some disadvantages like data leakage, denial of service, eavesdropping, lack of safety standards etc., This paper proposes a efficient method for safeguarding cloud data through Hyper elliptic curve cryptography (HECC). The proposed cryptographic technique offers effective encryption and decryption of data in the cloud.

     


  • Keywords


    Data Security, Hyper elliptic curves, Encryption and Decryption.

  • References


      [1] Joshi, J.B.D., Gail-JoonAhn. Security and Privacy Challenges inCloud Computing Environments.IEEE Security Privacy Magazine,Vol 8, IEEE Computer Society, 2010, p.24-31.

      [2] DebajyotiMukhopadhyay,AshayShirwadkar,PratikGaikar, TanmayAgrawal. Securingthe Data in Clouds with Hyperelliptic Curve Cryptography.13th International Conference on Information Technology, IEEE Computer Society, 2014, p.201-205.

      [3] R.Maheswari, S.Sheeba Rani, V.Gomathy and P.Sharmila, “Real Time Environment Simulation through Virtual Reality” in International Journal of Engineering and Technology(IJET) , Volume.7, No.7, pp 404-406, April 2018

      [4] Bouayad, A., et al. "Cloud computing: Security challenges." Information Science and Technology (CIST), 2012 Colloquium in.IEEE, 2012.

      [5] Thillaiarasu, N. and ChenthurPandian, S., 2017. A novel scheme fosafeguading confidentiality in public clouds fosevice uses of cloud computing. Cluster Computing, pp.1-10.

      [6] Shyamambika, N. and Thillaiarasu, N., 2016, January. A survey on acquiring integrity of shared data with effective user termination in the cloud. In Intelligent Systems and Control (ISCO), 2016 10th International Conference on (pp. 1-5). IEEE.

      [7] Thillaiarasu, N. and ChenthurPandian, S., 2016, January.Enforcing security and privacy over multi-cloud framework using assessment techniques. In Intelligent Systems and Control (ISCO), 2016 10th International Conference on (pp. 1-5). IEEE.

      [8] Shyamambika, N. and Thillaiarasu, N., 2016. Attaining integrity, secured data sharing and removal of misbehaving client in the public cloud using an external agent and secure encryption technique. Advances in Natural and Applied Sciences, 10(9 SE), pp.421-432.

      [9] Ranjithkumar, S. and Thillaiarasu, N., 2015.A Survey of Secure Routing Protocols of Mobile AdHoc Network.SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE)–volume, 2.

      [10] S. Balakrishnan, J. Janet, K.N. Sivabalan, “Secure Data Sharing In A Cloud Environment By Using Biometric Leakage resilient Authenticated Key Exchange”, Pak. J. Biotechnol. Vol. 15 (2) 293-297 (2018).

      [11] J. Janet, S. Balakrishnan and E. Murali, "Improved data transfer scheduling and optimization as a service in cloud," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-3.
      doi: 10.1109/ICICES.2016.7518895.

      [12] Balakrishnan S., Janet J., Spandana S. ”Extensibility of File Set Over Encoded Cloud Data Through Empowered Fine Grained Multi Keyword Search”. In: Deiva Sundari P., Dash S., Das S., Panigrahi B. (eds) Proceedings of 2nd International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 467. 2017. Springer, Singapore.

      [13] J. Janet, S. Balakrishnan and K. Somasekhara, "Fountain code based cloud storage mechanism for optimal file retrieval delay," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-4.
      doi: 10.1109/ICICES.2016.7518901.

      [14] J. Janet, S. Balakrishnan and E. R. Prasad, "Optimizing data movement within cloud environment using efficient compression techniques," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-5.doi: 10.1109/ICICES.2016.7518896.


 

View

Download

Article ID: 22045
 
DOI: 10.14419/ijet.v7i4.19.22045




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.