SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
117
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Application of Elliptical Curve Cryptography in Empowering Cloud Data
Security
T. Venkat Narayana Rao1
Professor, Dept. of Computer Science and Engineering
Sreenidhi Institute of Science and Technology
Hyderabad, India
Vanaparthy Sai Praneeth2
Student, Dept. of Computer Science and Engineering
Sreenidhi Institute of Science and Technology
Hyderabad, India
K. Sai Sharath 3
Student, Dept. of Computer Science and Engineering
Sreenidhi Institute of Science and Technology
Hyderabad, India.
Abstract: Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to
cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based
on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and
authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also
known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and
unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This
paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography.
The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give
access to the encryption keys stored in cloud.
Keywords: Cloud Computing, Data security, Cloud security, Encryption, Decryption, Elliptical Curve Cryptography, Digital signature, Elliptic
Curve Theory.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Cloud is basically a combination of servers at very high
level. Cloud computing allows us to access the internet
applications and services over internet. It allows us to create,
configure and customize online applications. Cloud computing
refers to accessing and making use of the hardware and
software resources remotely. It provides online data storage of
data. Cloud computing enables executing application directly on
the cloud without being application to be installed on the local
machine as shown in figure 1. This paper focus on the data
security and cloud protection inside the cloud processing that
can be attained by the application of cryptographic algorithms.
Fig 1: Cloud Computing
A. CRYPTOGRAPHY
Cryptography is the discipline or art of changing the text to
an encoded form that makes text ineligible for those who need
not read. This process of plaintext conversion using a
mechanism known as encryption. Decryption is to re-
conversion of cipher text back plaintext. In a private key
cryptography process, the encryption and decryption are
performed using a alike key which is secret key. The popular
examples are AES and DES algorithms. Public key
cryptography is also called as asymmetric key cryptographic
systems. A key is basically a value used in a cryptography
algorithm to translate raw text to cipher text. This has great
value and is measured in several parts. It is observed that the
more the key size used in the public key cryptography, the more
the secure the cryptographic mechanism would be.
B. DATA SECURITY
To produce data, most systems employ a combination
of methods, that includes:
1. Encryption means using a complex expression to encode the
data. In order to decode the encrypted data files, a user requires
an encryption key. While a user can obtain a cipher text but it is
in illegible format in order to decrypt the cipher text any user
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
118
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
needs a key , unauthorized users are prevented to access the
encryption key to offer security to private data.
2. Authentication procedure deal with creation of a user name
and security password.
3. Authorization practices - the cloud service providers(CSP)
enlist the users who are authorized to access information placed
on the cloud server. To secure user information every time on
different application diverse cryptographic algorithms and
authentication procedures are employed. Due to small processor
speed and run time memory; the devices require an algorithm
which can be utilized in small computer devices also. Security
of stored data and data in transition might be a concern while
storing sensitive data on the cloud storage.
C. CLOUD SECURITY ISSUES
There are 3 basic problems with cloud computing safety ,
that are: confidentiality, integrity and availability as shown in
figure 2.
Fig 2: Cloud Security Issues
Confidentiality: Confidentiality refers to authenticated person
would be able to access and retrieve the data. So in order to
protect the confidentiality of information, the information is
encrypted by the authorized person and later be able to decrypt
it as the information as key being known to him only. There
are two main threats of confidentiality those are snooping and
traffic analysis. Other ways to ensure information
confidentiality include enforcing file permissions and access
control list to restrict the access to sensitive information[4][8].
Integrity: Integrity is a act of protecting information from
being modified by unauthorized parties. This is a commonly
used method to protect data integrity which includes hashing the
data received and comparing it with the hash of the
initial/original message. However, this means that the hash of
the original data must be provided in a secure fashion. More
convenient methods could be to use existing schemes such as
GPG to digitally sign the data.
Availability: Availability is the information that is needed to
the authorized user whenever needed. There is need to worry
about confidentiality and integrity if the approved users cannot
get the information they are entitled to. It is one of the most
important feature of information security.
II. Basic Concepts and Literature
This paper provides an overview of the security issues of data
protection and privacy associated with cloud computing. The
methods presented in this study focus on enhancing security in
cloud computing and privacy protection by offering digital
signature generation and verification , encryption and
decryption mechanisms[1]. This approach offers cloud and data
security by providing protection to keys that are employed in
encryption and decryption. It is the combination of digital
signature algorithm of Diffie Hellman and Elliptical Curve
Cryptography encryption [4]. This method can be used to
prevent any unauthorized access to the privately data stored on
the cloud by any user. It is noticeable that usage of Elliptical
Curve Cryptography in wireless devices is superior to public
key encryption techniques. It aids in minimizing the processing
time of the devices[1][2].
The existing system uses Elliptical Curve Cryptography
algorithm for provisioning security to user’s data but it do have
some limitations in terms of key distribution and number of
keys shared under different attacks. In the existing system
private key is stored by partitioning private key into 3 different
parts and this is stored on three different storage locations,
hence, there is huge possibility that the hackers might perform
several attacks to access authenticated user’s data that is stored
on diverse locations in the cloud[2]. All these processes are
shown in existing model i.e. in figure 3.
Fig 3: Existing Model of security
III. IMPLEMENTATION AND EVALUATION
In the proposed system the digital signature is utilized for
authentication and AES algorithm is employed for encryption in
order to make the data safe in cloud environment [5][6].
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
119
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Storing data and security of data is the major liability of the
cloud provider. Hence, for competent data security and
consistency a mechanism is needed which offers secured data
encryption and decryption to provide a shield against the theft
and attacker. So, this system is implemented to provide
improved cloud data security in cloud computing using
Elliptical Curve Cryptography that provides additionally
security on data transmission, storage, authorization, and
authentication processes [6][7].
In the existing system, private data is encrypted using
encryption keys, and the encryption keys are partitioned into
numerous parts and are stored in dissimilar locations of cloud.
Hackers can perform many attacks and acquire the access of
encryption keys stored in various locations of cloud database. In
the proposed system in order to enhance the security in the
cloud data storage an attempt is made to keep a lock on the
encryption key from illegal access. An access control list is
arranged for the encryption key so that only permitted users
nominated in the access control list can obtain the access to the
encryption keys used for encryption and decryption of private
data stored in cloud. Encryption key is safe guarded by a lock,
whenever an user need to access key, validation occurs and
checks in the access control list to ascertain the user eligibility
to access the key stored in the cloud database. If the user is
found to be appropriate then only access the key, lock is
released on a particular key, upon conclusion the key is yet
again protected by the lock as shown in figure 4.
Figure 4: Proposed Control Access List Model
The Elliptical Curve Cryptography
Elliptic Curve cryptography (ECC) is a cryptographic
scheme that employs the features of elliptic curve to produce
cryptographic calculations[3][5]. In 1980s Koblitz and Miller
had proposed the elliptic curve cryptography. Over a restricted
field in discrete logarithmic cryptosystems , an elliptic curve is
the arrangement over a non-particular cubic polynomial
mathematical statement with two questions over a field F.
In short terms it is discretized set of outcomes for a curve that is
in the following structure:
y2 = x3 + ax + b (1)
If points P1 and P2 lie on the curve E, P3 = P1 + P2. Assume
both the clients follow a mathematical statement as given here
under in the pseudo-code :
1. The elliptic curve mathematical statement
2. Estimation of values a and b
3. Assume a prime number , p
4. The elliptical curve figure is produced from elliptic curve
equation
5. A base point, B is drawn from the elliptic gathering.
Key generation process:
1. UserA chooses a whole number dA i.e. UserA‘s private key.
2. UserA generates public key PA= dA*B
3. UserB correspondingly selects a private key dB and compute
public key PB= dB *B
4. UserA generates a security key K= dA *PB. UserB produces
the security key i.e. K= dB *PA.
Signature Generation: For marking a message m by UserA, use
UserA‘s private key dA :
1. Compute e=HASH (m), wherein, HASH means
cryptographic hash function, such as SHA-1
2. Opt for an arbitrary whole number k from the range [1, n −
1]
3. Calculate r=x1(mod n), where (x1, y1) =k*B and If r=0,
Then go to step 2
4. Computes k−1(e+dAr)(mod n).If s=0, then go to step2
5. The signature is a couple as (r, s).
6. Send signature (r, s) to client UserB.
The Encryption algorithm: Suppose UserA intends to transmit
encrypted message UserB.
1. UserA takes plaintext message M, and encodes it onto a
point, PM, from the elliptic gathering.
2. UserA picks another arbitrary whole number, k from the
interval ranging [1, p-1]
3. The cipher text is a couple of points i.e.
PC = [ (kB), (PM + kPB) ]
5. Send cipher text PC to UserB.
The Decryption algorithm: UserB assumes following steps to
decrypt the cipher text PC.
1. UserB computes the result of the main point from PC and his
private key i.e. dB dB * (kB)
2. UserB then takes this data item and subtracts it from the
second point from PC
3. (PM + kPB) – [dB(kB)] = PM + k(dBB) – dB(kB) = PM
4. UserB might deciphers PM to get the originalmessage, M.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
120
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Signature Verification: Inm a process for UserB client to
authenticate UserA's signature, UserB must have UserA‘s
public key PA
1. Confirm that r and s values are whole numbers in the range of
[1, n − 1]. If not, the signature is invalid.
2. Evaluate value e = HASH (m), wherein HASH is the same
function utilized in the signature generation.
3. Evaluate value w = s −1 (mod n)
4. calculate u1 = ew (mod n) and u2 = rw (mod n)
5. calculate (x1, y1) = u1B + u2PA
6. The signature is valid if the value of x1 = r (mod n),
otherwise invalid.
Fig 5:Elliptic Curve
As shown in the above figure 5, let P=(x1, y1), Q=(x2, y2),
R=(x3,y3) and P not equals Q.
To find the insertion with E. we get
Example:
P=(-2.35, -1.86)
Q=(-0.10, 0.836)
–R(3.89, 5.62) and R(3.89, -5.62)
P+Q=R=(3.890, -5.620)
For Example:
P(2, 2.65),
–R(-1.11, -2.64),
R(-1.11, 2.64)
2P=R=(-1.11, -2.64)
For Example:
UserA Encrypts:
1 .Suppose UseA wants to send a message to UserB.
2. Plaintext is x=(10,9) which is a point in E
3. Select a random value for k, k=3
4. Now compute (y1,y2):
y1=3(2.0,7.00)=(8.00,3.00)
y2=(10,9)+3(7,2)
=(10,9)+(3,5)
=(10.0,2.00)
5. UserA transmits y=((8,3),(10,2))
UserB Decrypts:
1.UserB receives y=((8,3),(10,2))
2.Compute x=(10,2)-7(8,3)
=(10,2)-(3,5)
=(10,2)+(3,6)
=(10,9)
(10,9) which is the plaintext. In this way UserB is able to find
original message (10,9) which is delivered by UserA to UserB.
Application of ECC
Many devices are small and have limited storage and
computational power. Following are the key devices used in the
present scenario.
1.Wireless communication devices
2. Smart digital cards
3.Web servers that need to handle many encryption sessions.
Any application that need security usually lacks in power,
storage and computational power which happens to be very
much necessary for the current cryptosystems.
IV.CONCLUSION AND FUTURE WORK
Elliptic Curve Cryptography provides better security
and has shown efficient performance compared to first
generation public key cryptography techniques like RSA which
is now in use. After comparing the RSA and ECC ciphers, the
ECC has manifested a feature to withstand complex scenarios
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 117 – 121
_______________________________________________________________________________________________
121
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
and has exhibited less overheads as compared to RSA. The ECC
has many merits due to its ability to provide the same level of
security using less key size. ECC is suitable for many devices
that are small and have limited storage and computational
power to implement encryption and decryption on private data.
The future of ECC looks brighter than other algorithms as
today’s applications include smart cards, pagers, and cell
phones and do not witness overheads introduced by RSA
algorithm. Although ECC’s security has not been completely
evaluated, it is expected to come into widespread use in diverse
fields in the future. Before introducing ECC onto larger
networks, it must be thoroughly tested to improve the security
and efficiency i.e in terms of application to application.
REFERENCES
[1] Deyen Chen Hong Zhao, Data Security and Privacy Protection
Issues in Cloud Computing, Computer Science and Electronics
Engineering (ICCSE), 2012 International Conference on
(Vol.:1) ePrint-23-25 Mar.2012.
[2] Ramgovind, S. Eloff, M. ; Smith, E, The management of
security of Cloud computing, Information Security for South
Africa (ISSA), 2010, ePrint 2/4August.
[3] Parsi Kalpana , Sudha Singaraju, Data Security in Cloud
Computing using RSA Algorithm, International Journal of
Research in Computer and Communication tech., IJRCCT,
Sept. 2012.
[4] Neha Tirthani, and Ganesan.R R, Data Security in Cloud
Architecture Based on Diffie Hellman and Elliptical Curve
Cryptography, International Association for Cryptologic
Research Cryptology vol. 4-9, 2014.
[5] Prof Swarnalata Bolavarapu, Bharat Gupta, Data Security in
Cloud Computing, Int’l Journal of Advanced Research in
Computer Science and Software Engineering , Vol.4/ 3, March
2014.
[6] Dhaval Patel, M.B.Chaudhri, Data Security In Cloud
Computing Using Digital Signature, International Journal For
Technological Research In Engineering , June-2014.
[7] N. Koblitz, elliptic curve cryptosystem, Mathematics of
Computation, Vol. 48-1987, PP-203-209.
[8] Ms. Bhavana Sharma, Security Architecture Of Cloud
Computing Based On Elliptic Curve Cryptography (ECC),
International Journal of Advances in Engineering Sciences
Vol.3/3, July, 2013.
[9] Ms. Priyanka Shaarda, Providing data security in cloud
computing using elliptical curve cryptography, Int’l Journal on
Recent and innovation trends in computing and
communication, volume3/2, 2015.

More Related Content

What's hot

IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Data
ijtsrd
 
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
IRJET Journal
 
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 New Research Articles - 2018 November Issue- Advanced Computing: An Internat... New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
acijjournal
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
IJSRED
 
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANAn Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
rahulmonikasharma
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd Iaetsd
 
Internet of Things Architecture Based Cloud for Healthcare
Internet of Things Architecture Based Cloud for HealthcareInternet of Things Architecture Based Cloud for Healthcare
Internet of Things Architecture Based Cloud for Healthcare
Istabraq M. Al-Joboury
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data SecurityOnline Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
IJERA Editor
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
csandit
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
 
Geometry in cryptography a review
Geometry in cryptography   a reviewGeometry in cryptography   a review
Geometry in cryptography a review
eSAT Journals
 

What's hot (18)

IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Data
 
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
 
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 New Research Articles - 2018 November Issue- Advanced Computing: An Internat... New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
 
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANAn Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
 
Internet of Things Architecture Based Cloud for Healthcare
Internet of Things Architecture Based Cloud for HealthcareInternet of Things Architecture Based Cloud for Healthcare
Internet of Things Architecture Based Cloud for Healthcare
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data SecurityOnline Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
Geometry in cryptography a review
Geometry in cryptography   a reviewGeometry in cryptography   a review
Geometry in cryptography a review
 

Similar to Application of Elliptical Curve Cryptography in Empowering Cloud Data Security

Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
rahulmonikasharma
 
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big DataAuthentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
rahulmonikasharma
 
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
rahulmonikasharma
 
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health CloudA Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
rahulmonikasharma
 
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-201728 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
rahulmonikasharma
 
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max NetworksNew Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
rahulmonikasharma
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access RestrictionsSafeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
rahulmonikasharma
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Security
rahulmonikasharma
 
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsSurvey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
AM Publications
 
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANAn Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
rahulmonikasharma
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
rahulmonikasharma
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
eSAT Journals
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 

Similar to Application of Elliptical Curve Cryptography in Empowering Cloud Data Security (20)

Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
 
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big DataAuthentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
 
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
 
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health CloudA Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
 
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-201728 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
 
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max NetworksNew Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access RestrictionsSafeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Security
 
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsSurvey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
 
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANAn Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
1426742816
14267428161426742816
1426742816
 
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
rahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
 

Recently uploaded

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 

Recently uploaded (20)

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 

Application of Elliptical Curve Cryptography in Empowering Cloud Data Security

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 117 – 121 _______________________________________________________________________________________________ 117 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Application of Elliptical Curve Cryptography in Empowering Cloud Data Security T. Venkat Narayana Rao1 Professor, Dept. of Computer Science and Engineering Sreenidhi Institute of Science and Technology Hyderabad, India Vanaparthy Sai Praneeth2 Student, Dept. of Computer Science and Engineering Sreenidhi Institute of Science and Technology Hyderabad, India K. Sai Sharath 3 Student, Dept. of Computer Science and Engineering Sreenidhi Institute of Science and Technology Hyderabad, India. Abstract: Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography. The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give access to the encryption keys stored in cloud. Keywords: Cloud Computing, Data security, Cloud security, Encryption, Decryption, Elliptical Curve Cryptography, Digital signature, Elliptic Curve Theory. __________________________________________________*****_________________________________________________ I. INTRODUCTION Cloud is basically a combination of servers at very high level. Cloud computing allows us to access the internet applications and services over internet. It allows us to create, configure and customize online applications. Cloud computing refers to accessing and making use of the hardware and software resources remotely. It provides online data storage of data. Cloud computing enables executing application directly on the cloud without being application to be installed on the local machine as shown in figure 1. This paper focus on the data security and cloud protection inside the cloud processing that can be attained by the application of cryptographic algorithms. Fig 1: Cloud Computing A. CRYPTOGRAPHY Cryptography is the discipline or art of changing the text to an encoded form that makes text ineligible for those who need not read. This process of plaintext conversion using a mechanism known as encryption. Decryption is to re- conversion of cipher text back plaintext. In a private key cryptography process, the encryption and decryption are performed using a alike key which is secret key. The popular examples are AES and DES algorithms. Public key cryptography is also called as asymmetric key cryptographic systems. A key is basically a value used in a cryptography algorithm to translate raw text to cipher text. This has great value and is measured in several parts. It is observed that the more the key size used in the public key cryptography, the more the secure the cryptographic mechanism would be. B. DATA SECURITY To produce data, most systems employ a combination of methods, that includes: 1. Encryption means using a complex expression to encode the data. In order to decode the encrypted data files, a user requires an encryption key. While a user can obtain a cipher text but it is in illegible format in order to decrypt the cipher text any user
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 117 – 121 _______________________________________________________________________________________________ 118 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ needs a key , unauthorized users are prevented to access the encryption key to offer security to private data. 2. Authentication procedure deal with creation of a user name and security password. 3. Authorization practices - the cloud service providers(CSP) enlist the users who are authorized to access information placed on the cloud server. To secure user information every time on different application diverse cryptographic algorithms and authentication procedures are employed. Due to small processor speed and run time memory; the devices require an algorithm which can be utilized in small computer devices also. Security of stored data and data in transition might be a concern while storing sensitive data on the cloud storage. C. CLOUD SECURITY ISSUES There are 3 basic problems with cloud computing safety , that are: confidentiality, integrity and availability as shown in figure 2. Fig 2: Cloud Security Issues Confidentiality: Confidentiality refers to authenticated person would be able to access and retrieve the data. So in order to protect the confidentiality of information, the information is encrypted by the authorized person and later be able to decrypt it as the information as key being known to him only. There are two main threats of confidentiality those are snooping and traffic analysis. Other ways to ensure information confidentiality include enforcing file permissions and access control list to restrict the access to sensitive information[4][8]. Integrity: Integrity is a act of protecting information from being modified by unauthorized parties. This is a commonly used method to protect data integrity which includes hashing the data received and comparing it with the hash of the initial/original message. However, this means that the hash of the original data must be provided in a secure fashion. More convenient methods could be to use existing schemes such as GPG to digitally sign the data. Availability: Availability is the information that is needed to the authorized user whenever needed. There is need to worry about confidentiality and integrity if the approved users cannot get the information they are entitled to. It is one of the most important feature of information security. II. Basic Concepts and Literature This paper provides an overview of the security issues of data protection and privacy associated with cloud computing. The methods presented in this study focus on enhancing security in cloud computing and privacy protection by offering digital signature generation and verification , encryption and decryption mechanisms[1]. This approach offers cloud and data security by providing protection to keys that are employed in encryption and decryption. It is the combination of digital signature algorithm of Diffie Hellman and Elliptical Curve Cryptography encryption [4]. This method can be used to prevent any unauthorized access to the privately data stored on the cloud by any user. It is noticeable that usage of Elliptical Curve Cryptography in wireless devices is superior to public key encryption techniques. It aids in minimizing the processing time of the devices[1][2]. The existing system uses Elliptical Curve Cryptography algorithm for provisioning security to user’s data but it do have some limitations in terms of key distribution and number of keys shared under different attacks. In the existing system private key is stored by partitioning private key into 3 different parts and this is stored on three different storage locations, hence, there is huge possibility that the hackers might perform several attacks to access authenticated user’s data that is stored on diverse locations in the cloud[2]. All these processes are shown in existing model i.e. in figure 3. Fig 3: Existing Model of security III. IMPLEMENTATION AND EVALUATION In the proposed system the digital signature is utilized for authentication and AES algorithm is employed for encryption in order to make the data safe in cloud environment [5][6].
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 117 – 121 _______________________________________________________________________________________________ 119 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Storing data and security of data is the major liability of the cloud provider. Hence, for competent data security and consistency a mechanism is needed which offers secured data encryption and decryption to provide a shield against the theft and attacker. So, this system is implemented to provide improved cloud data security in cloud computing using Elliptical Curve Cryptography that provides additionally security on data transmission, storage, authorization, and authentication processes [6][7]. In the existing system, private data is encrypted using encryption keys, and the encryption keys are partitioned into numerous parts and are stored in dissimilar locations of cloud. Hackers can perform many attacks and acquire the access of encryption keys stored in various locations of cloud database. In the proposed system in order to enhance the security in the cloud data storage an attempt is made to keep a lock on the encryption key from illegal access. An access control list is arranged for the encryption key so that only permitted users nominated in the access control list can obtain the access to the encryption keys used for encryption and decryption of private data stored in cloud. Encryption key is safe guarded by a lock, whenever an user need to access key, validation occurs and checks in the access control list to ascertain the user eligibility to access the key stored in the cloud database. If the user is found to be appropriate then only access the key, lock is released on a particular key, upon conclusion the key is yet again protected by the lock as shown in figure 4. Figure 4: Proposed Control Access List Model The Elliptical Curve Cryptography Elliptic Curve cryptography (ECC) is a cryptographic scheme that employs the features of elliptic curve to produce cryptographic calculations[3][5]. In 1980s Koblitz and Miller had proposed the elliptic curve cryptography. Over a restricted field in discrete logarithmic cryptosystems , an elliptic curve is the arrangement over a non-particular cubic polynomial mathematical statement with two questions over a field F. In short terms it is discretized set of outcomes for a curve that is in the following structure: y2 = x3 + ax + b (1) If points P1 and P2 lie on the curve E, P3 = P1 + P2. Assume both the clients follow a mathematical statement as given here under in the pseudo-code : 1. The elliptic curve mathematical statement 2. Estimation of values a and b 3. Assume a prime number , p 4. The elliptical curve figure is produced from elliptic curve equation 5. A base point, B is drawn from the elliptic gathering. Key generation process: 1. UserA chooses a whole number dA i.e. UserA‘s private key. 2. UserA generates public key PA= dA*B 3. UserB correspondingly selects a private key dB and compute public key PB= dB *B 4. UserA generates a security key K= dA *PB. UserB produces the security key i.e. K= dB *PA. Signature Generation: For marking a message m by UserA, use UserA‘s private key dA : 1. Compute e=HASH (m), wherein, HASH means cryptographic hash function, such as SHA-1 2. Opt for an arbitrary whole number k from the range [1, n − 1] 3. Calculate r=x1(mod n), where (x1, y1) =k*B and If r=0, Then go to step 2 4. Computes k−1(e+dAr)(mod n).If s=0, then go to step2 5. The signature is a couple as (r, s). 6. Send signature (r, s) to client UserB. The Encryption algorithm: Suppose UserA intends to transmit encrypted message UserB. 1. UserA takes plaintext message M, and encodes it onto a point, PM, from the elliptic gathering. 2. UserA picks another arbitrary whole number, k from the interval ranging [1, p-1] 3. The cipher text is a couple of points i.e. PC = [ (kB), (PM + kPB) ] 5. Send cipher text PC to UserB. The Decryption algorithm: UserB assumes following steps to decrypt the cipher text PC. 1. UserB computes the result of the main point from PC and his private key i.e. dB dB * (kB) 2. UserB then takes this data item and subtracts it from the second point from PC 3. (PM + kPB) – [dB(kB)] = PM + k(dBB) – dB(kB) = PM 4. UserB might deciphers PM to get the originalmessage, M.
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 117 – 121 _______________________________________________________________________________________________ 120 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Signature Verification: Inm a process for UserB client to authenticate UserA's signature, UserB must have UserA‘s public key PA 1. Confirm that r and s values are whole numbers in the range of [1, n − 1]. If not, the signature is invalid. 2. Evaluate value e = HASH (m), wherein HASH is the same function utilized in the signature generation. 3. Evaluate value w = s −1 (mod n) 4. calculate u1 = ew (mod n) and u2 = rw (mod n) 5. calculate (x1, y1) = u1B + u2PA 6. The signature is valid if the value of x1 = r (mod n), otherwise invalid. Fig 5:Elliptic Curve As shown in the above figure 5, let P=(x1, y1), Q=(x2, y2), R=(x3,y3) and P not equals Q. To find the insertion with E. we get Example: P=(-2.35, -1.86) Q=(-0.10, 0.836) –R(3.89, 5.62) and R(3.89, -5.62) P+Q=R=(3.890, -5.620) For Example: P(2, 2.65), –R(-1.11, -2.64), R(-1.11, 2.64) 2P=R=(-1.11, -2.64) For Example: UserA Encrypts: 1 .Suppose UseA wants to send a message to UserB. 2. Plaintext is x=(10,9) which is a point in E 3. Select a random value for k, k=3 4. Now compute (y1,y2): y1=3(2.0,7.00)=(8.00,3.00) y2=(10,9)+3(7,2) =(10,9)+(3,5) =(10.0,2.00) 5. UserA transmits y=((8,3),(10,2)) UserB Decrypts: 1.UserB receives y=((8,3),(10,2)) 2.Compute x=(10,2)-7(8,3) =(10,2)-(3,5) =(10,2)+(3,6) =(10,9) (10,9) which is the plaintext. In this way UserB is able to find original message (10,9) which is delivered by UserA to UserB. Application of ECC Many devices are small and have limited storage and computational power. Following are the key devices used in the present scenario. 1.Wireless communication devices 2. Smart digital cards 3.Web servers that need to handle many encryption sessions. Any application that need security usually lacks in power, storage and computational power which happens to be very much necessary for the current cryptosystems. IV.CONCLUSION AND FUTURE WORK Elliptic Curve Cryptography provides better security and has shown efficient performance compared to first generation public key cryptography techniques like RSA which is now in use. After comparing the RSA and ECC ciphers, the ECC has manifested a feature to withstand complex scenarios
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 117 – 121 _______________________________________________________________________________________________ 121 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ and has exhibited less overheads as compared to RSA. The ECC has many merits due to its ability to provide the same level of security using less key size. ECC is suitable for many devices that are small and have limited storage and computational power to implement encryption and decryption on private data. The future of ECC looks brighter than other algorithms as today’s applications include smart cards, pagers, and cell phones and do not witness overheads introduced by RSA algorithm. Although ECC’s security has not been completely evaluated, it is expected to come into widespread use in diverse fields in the future. Before introducing ECC onto larger networks, it must be thoroughly tested to improve the security and efficiency i.e in terms of application to application. REFERENCES [1] Deyen Chen Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing, Computer Science and Electronics Engineering (ICCSE), 2012 International Conference on (Vol.:1) ePrint-23-25 Mar.2012. [2] Ramgovind, S. Eloff, M. ; Smith, E, The management of security of Cloud computing, Information Security for South Africa (ISSA), 2010, ePrint 2/4August. [3] Parsi Kalpana , Sudha Singaraju, Data Security in Cloud Computing using RSA Algorithm, International Journal of Research in Computer and Communication tech., IJRCCT, Sept. 2012. [4] Neha Tirthani, and Ganesan.R R, Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography, International Association for Cryptologic Research Cryptology vol. 4-9, 2014. [5] Prof Swarnalata Bolavarapu, Bharat Gupta, Data Security in Cloud Computing, Int’l Journal of Advanced Research in Computer Science and Software Engineering , Vol.4/ 3, March 2014. [6] Dhaval Patel, M.B.Chaudhri, Data Security In Cloud Computing Using Digital Signature, International Journal For Technological Research In Engineering , June-2014. [7] N. Koblitz, elliptic curve cryptosystem, Mathematics of Computation, Vol. 48-1987, PP-203-209. [8] Ms. Bhavana Sharma, Security Architecture Of Cloud Computing Based On Elliptic Curve Cryptography (ECC), International Journal of Advances in Engineering Sciences Vol.3/3, July, 2013. [9] Ms. Priyanka Shaarda, Providing data security in cloud computing using elliptical curve cryptography, Int’l Journal on Recent and innovation trends in computing and communication, volume3/2, 2015.