PKI-based cryptography for secure cloud data storage using ECC

It is widely accepted cloud storage provides a lot of benefits to its users by significantly reducing the burden of storage and computation. However unlike traditional data storage systems, cloud data is produced, transferred and stored at off-premise multi-tenant storage systems. This increases the vulnerability of unauthorized disclosure and unauthorized modification. Hence without appropriate security and privacy solution in place it will cause some critical data security problems to its users. In this paper we address the security issues of storing private and sensitive data in the cloud storage service and proposed a PKI-based Cryptography scheme for cloud storage. Our scheme has several advantages. First it can ensure the users have the identity they claim in the virtual cloud storage world. Second, it secures the data during its entire life-cycle; the whole process doesn't reveal the clear data to any third party including the cloud provider. Third, it offers controlled data access and sharing among users, so that unauthorized users or untrusted servers can't access or search over data without data owner's authorization. At last, we apply ECC for all the cryptographic operations of our scheme, which provides low computation and communication cost as well as less key-size to provide same level of security as of RSA, and thus it makes our scheme more efficient.

[1]  Xinwen Zhang,et al.  Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing , 2011, CCS '11.

[2]  G. P. Biswas,et al.  DESIGN OF M OBILE PUBLIC KEY INFRASTRUCTURE (M-PKI)USING ELLIPTIC CURVE CRYPT OGRAPHY , 2013 .

[3]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[4]  Kazuhiro Yokoyama,et al.  Elliptic curve cryptosystem , 2000 .

[5]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[6]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[7]  N. Jenefa,et al.  A Cloud Storage System with Data Confidentiality and Data Forwarding , 2013 .

[8]  Qin Liu,et al.  Efficient Sharing of Secure Cloud Storage Services , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[9]  Bernd Zwattendorfer,et al.  Secure cloud authentication using eIDs , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[10]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[11]  Sean Turner,et al.  Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) , 2010, RFC.

[12]  Xiaoyuan Yang,et al.  Secure Cloud File System with Attribute Based Encryption , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[13]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .