Elliptic Curve Cryptography for Securing Cloud Computing Applications

Computing applications and data are growing so rapidly that increasingly larger servers and data centre are needed for fast processing within the required time. A fundamental shift in the way Information Technology (IT) and computing services are being delivered and purchased results in the development of cloud computing. The out of control cost of power in terms of electricity generation, personnel hardware and limited spaces in data centers have encouraged a significant number of enterprises to move more infrastructures into a third party provided Cloud. However, Cloud computing requires that organizations trust that a service provider’s platforms are secured and provide a sufficient level of integrity for the client’s data. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. An important factor is the key strength, i.e. the difficulty in breaking the key and retrieving the plain text. In this paper, we proposed Elliptic Curve Cryptography scheme as a secure tool to model a Secured platform for the Cloud Application.

[1]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[2]  James E. Smith,et al.  Virtual machines - versatile platforms for systems and processes , 2005 .

[3]  Timothy W. Finin,et al.  Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.

[4]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[5]  Ami Marowka,et al.  The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..

[6]  A. Zahariev Google App Engine , 2009 .

[7]  Rajkumar Buyya,et al.  GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..

[8]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[9]  Randhir Kumar,et al.  Implementation of Elliptical Curve Cryptography , 2011 .

[10]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[11]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[12]  Ian T. Foster,et al.  GangSim: a simulator for grid scheduling studies , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..

[13]  Rusli Abdullah,et al.  Formulating a security layer of cloud data storage framework based on multi agent system architecture. , 2010 .

[14]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[15]  Tanja Lange,et al.  Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .

[16]  Bo Peng,et al.  Implementation Issues of A Cloud Computing Platform , 2009, IEEE Data Eng. Bull..

[17]  F. John Krautheim,et al.  Private Virtual Infrastructure for Cloud Computing , 2009, HotCloud.

[18]  Idit Keidar,et al.  Trusting the cloud , 2009, SIGA.

[19]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[20]  Wolfgang Bauer Implementing elliptic curve cryptography , 2002, Communications and Multimedia Security.

[21]  Aladdin Ayesh,et al.  Framework of multi-agents internet security system , 2000 .

[22]  Pedro A. C. Sousa,et al.  Dealing with Security within the DEEPSIA Project , 2002 .

[23]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[24]  Muhammad Yasir Malik Efficient implementation of Elliptic Curve Cryptography using low-power Digital Signal Processor , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[25]  D. O'Mahony,et al.  Electronic payment systems for e-commerce , 2001 .

[26]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[27]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[28]  Henri Casanova,et al.  Scheduling distributed applications: the SimGrid simulation framework , 2003, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings..

[29]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[30]  Stuart McClure,et al.  Hacking Exposed; Network Security Secrets and Solutions , 1999 .

[31]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.