An Improved Encryption and Signature Verification ECC Scheme for Cloud Computing

Ensuring the security and efficient authentication of any information is a prime concern for a cryptographic technique. In cloud model, since data is outsourced over untrusted third party without any physical possession of that, increase the concern regarding the cloud data security. Public key cryptography technique in cloud system is useful only if there is proper authentication of transformation of public key to authenticated user only. On the other hand, ECC technique compared to this provides different ways of ECC cryptographic key management, encryption, decryption, and digital signature and its verification. The advantage of ECC over public key scheme is that, it provides the same security level for a smaller key size compared to public key scheme, thus, reducing the process time of any cryptographic operation over the data in its communication between different cloud communicating parties. In this paper, we present a new framework for cloud system which has a different way of encryption/ decryption using ECC over finite field and improve signature and verification scheme. The result shows that communication cost is less compared to other scheme and improved speedup for signature and verification.

[1]  Kin Choong Yow,et al.  A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES , 2010 .

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  A. Chandrasekhar,et al.  Encryption of Data using Elliptic Curve over Finite fields , 2012, ArXiv.

[6]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[7]  Kazuhiro Yokoyama,et al.  Elliptic curve cryptosystem , 2000 .

[8]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[9]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[10]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[11]  Yu-Fang Chung,et al.  ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.

[12]  Mohsen Machhout,et al.  Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor , 2010, International journal of Network Security & Its Applications.

[13]  Yong Tang,et al.  Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[14]  Omar Khadir,et al.  New digital signature protocol based on elliptic curves , 2012, ArXiv.

[15]  A. Chandrasekhar,et al.  Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields , 2011 .

[16]  K R Chandrasekhara Pillai,et al.  Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment , 2010 .