Enhanced Security at Cloud Data with AES and ECC Cryptographic Algorithm

Alagappa Institute of Skill Development & Computer Centre,Alagappa University, Karaikudi, India.15 -16 February 2017. IT Skills Show & International Conference on Advancements In Computing Resources (SSICACR-2017)

Format: Volume 5, Issue 1, No 16, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: G.Shreedevi

Reference:IJCS-234

View PDF Format

Abstract

Data privacy protection and data retrieval control are the challenging issues to be addressed in cloud computing. The paper presents away to provide the safety and security to the user‟s data, a Data security model that uses both AES and ECC Algorithm is proposed.By applying AES algorithm for digital signature on the message digestinstead of on the whole data to make the computations faster. Elliptic Curve Cryptography (ECC) was discovered as a mechanism for implementing public-key cryptography. In this work both digital signature scheme and public key cryptography are integrated to enhance the security level of Cloud.

References

[1] Yashpalsinh Jadeja, Kirit Modi,” Cloud Computing – Concepts, Architecture and Challenges”, 2012 International Conference on Computing, Electronics and Electrical Technologies, 978-1-4673-0210-4/12/. [2] M.R Tribhuwan, V.A Buyar, Shabana pirzade,”Ensuring data security in Cloud Computing through Two-Way Handshake Based on token Management”,2010 International Conference on Advances in Recent Technologies in Communication and Computing,978-0-7695-4201-0/10. [3] P. Syam Kumar, R. Subramanian and D. Thamizh Selvam,” Ensuring Data Storage Security in Cloud Computing using Sobol Sequence”,2010 1st International Conference on Parallel, Distributed and Grid Computing, 978-1-4244-7674-9/10. [4] Uma Somani, Kanika Lakhani, Manish Mundra, ” Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”,2010 1st International Conference on Parallel, Distributed and Grid Computing, 978-1-4244-7674-9/10. [5] M. Auxilia, K. Raja,”A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing”, 2012 International Conference on Radar, Communication and Computing, 978-1-4673-2758-9/12. [6] Feng-qing Zhang, Dian-Yuan Han, “Applying Agents to the Data Security in Cloud Computing”, 2012 International Conference on ComputerScience and Information Processing,978-1-4673-1411-4/12. [7] Shuai Han, Jianchuan Xing,” Ensuring Data Storage Security througha Novel Third Party Auditor Scheme In Cloud Computing”Proceedingsof IEEE CCIS2011, 978-1-61284-204-2/11.


Keywords

Data security, Hashing,AES algorithm, Digital Signature, ECC algorithm.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog