Improving Data Storage Security in Cloud Computing Using Elliptic Curve Cryptography

Companies tends towards more availability, less cost, managed risk, agilityall of which are providing by cloud computing. The cloud computing is a way to deliver IT services on demand and pay per usage, and it can stores huge amount of data. But until now many companies don’t wish to use cloud computing technology due to concerns about data secrecy and protection. This paper aims to provide a secure, effective, and flexible method to improve data storage security in cloud computing. By using IBC the key management complexity will decrease and not need to certificate issued, also the use of ECC provides data confidentiality and use ECDS provides data integrity.

[1]  Sugang Ma,et al.  A Review on Cloud Computing Development , 2012, J. Networks.

[2]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[3]  Chunming Rong,et al.  Identity-Based Cryptography , 2009, Cryptology and Information Security Series.

[4]  C. Yeun,et al.  Cloud computing security management , 2010, 2010 Second International Conference on Engineering System Management and Applications.

[5]  K. C. Reddy,et al.  Signcryption scheme for Identity-based Cryptosystems , 2003, IACR Cryptol. ePrint Arch..

[6]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[7]  Majid Khabbazian,et al.  Software Elliptic Curve Cryptography , 2007 .

[8]  Suresha,et al.  Enhancing Security in Cloud Storage using ECC Algorithm , 2013 .

[9]  Victor Delgado Garcia,et al.  Exploring the limits of cloud computing , 2011 .

[10]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[11]  Joonsang Baek,et al.  A Survey of Identity-Based Cryptography , 2004 .

[12]  Mohamed Layouni,et al.  Privacy-preserving Personal Information Management , 2009 .

[13]  Kashif Kifayat,et al.  Mediated IBC-Based Management System of Identity and Access in Cloud Computing , 2012 .

[14]  Liang Yan,et al.  Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.

[15]  Syam Kumar,et al.  An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing , 2011 .

[16]  K. Govinda,et al.  Identity anonymization and secure data storage using group signature in private cloud , 2012, ICACCI '12.

[17]  Chester Rebeiro,et al.  ARCHITECTURE EXPLORATIONS FOR ELLIPTIC CURVE CRYPTOGRAPHY ON FPGAS , 2008 .

[18]  Jeffrey M. Voas,et al.  Cloud Computing: New Wine or Just a New Bottle? , 2009, IT Professional.

[19]  D. Meng Data security in cloud computing , 2013, 2013 8th International Conference on Computer Science & Education.