Enhanced Cloud Security Implementation Using Modified ECC Algorithm

Cloud computation is an emerging technique of providing data backup and managing applications on centralized servers. The cloud services are dependent on Internet which provides the shared resources to the users during the times of demand. The users can be in a state of mobility, but are still capable of retrieving the data from cloud. These data are open to security attacks. Cloud Service Providers (CSP) need to maintain large quantity of data by overcoming the security threats through adoption of suitable, secure schemes. The cloud data are often required by the users of various interests. In order to provide privacy to sensitive data, a Modified Elliptic Curve Cryptography (MECC) algorithm is proposed in this paper. The proposed algorithm generates separate key for all admins and users to access the data. The data is encrypted and decrypted by utilizing the similar MECC algorithm. Whenever the users and other admins want to access the cloud data, they are verified for their identity. After positive verification, the requesters are provided with attributes. The receivers execute the MECC algorithm and generate private key for decrypting the data with these attributes. This ensures high degree of data encapsulation in cloud computation. Performance comparison between the proposed and conventional schemes are carried out and observed that the MECC algorithm is highly secure than other conventional schemes.

[1]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[2]  Aswin Achuthshankar,et al.  Encryption of Reversible Data Hiding for Better Visibility and High Security , 2016 .

[3]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[4]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[5]  Muhammad Sher,et al.  A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography , 2016, Electron. Commer. Res..

[6]  Li Lin,et al.  PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments , 2018, IEEE Access.

[7]  N. Kshetri Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .

[8]  Sathya Narayanan,et al.  Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud , 2015 .

[9]  Paul D. Manuel,et al.  A trust model of cloud computing based on Quality of Service , 2015, Ann. Oper. Res..

[10]  Radulescu Constanta Zoie Cloud Provider's Services Evaluation Using Triangular Fuzzy Numbers , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).

[11]  Rajkumar Buyya,et al.  A framework for ranking of cloud computing services , 2013, Future Gener. Comput. Syst..