close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Data Security in Cloud Using Elliptic Curve Cryptography

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

LITERATURE SURVEY

Number of data security models have been developed to address the data security issues in cloud computing.

M.R Tribhuwan, V.A Buyar, Shabana pirzade considers the data security model using Two-Way handshake is a method which utilizes the homomorphic token with distributed verification of erasure-coded data and achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s).

P. Syam Kumar, R. Subramanian and D. Thamizh Selvam analyses Sobol sequence method rely on erasure code for the availability, reliability of data and utilize token pre computation using Sobol Sequence to verify the integrity of erasure coded data rather than Pseudorandom Data in existing system, this scheme provides more security to user data stored in cloud computing. The performance analysis shows that scheme is more secure than existing system against Byzantine failure, unauthorized data modification attacks, and even cloud server colluding attacks.

Accoding to Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou, in public auditing to support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient .

In RSA cryptosystem Research Paper, Uma Somani, Kanika Lakhani, Manish Mundra, have tried to assess Cloud Storage Methodology and Data Security in cloud by the Implementation of digital signature with RSA algorithm in paper.

Recently, Chengliang Wang, Gebeyehu Belay Gebremeskal proposed a model which uses computational intelligence performance. Computational intelligence (CI) is a mathematical modeling technique of cloud computing, which are vitally importance to simplifying the complex system and designing proactive and adaptive system in a dynamic and complex environment towards data security.

M. Auxilia , K. Raja proposed the semantic based access control model, which considers relationships among the entities in all domains of access control namely Subject (user), Object(Data/resource), Action(select, open, read, write) and so on, it is also shown how to reduce the semantic interrelationships into subsumption problem. This reduction facilitates the propagation of policies in these domains and also enhances time and space complexity of access control mechanisms.

Feng-qing Zhang, Dian-Yuan Han, considers applying agent’s method introducing agents to data security module, provides more reliable services.

Shuai Han, Jianchuan Xing, proposed a novel third party auditor scheme a third party auditor which affords trustful authentication for user to operate their data security in cloud. The obvious advantage of this scheme is that the cloud service provider can offer the functions which were provided by the traditional third party auditor and make it trustful. So it indeed reduces the constitution’s complexity in Cloud Computing.

Method proposed in paper

Key generation is an important part where we have to generate both public key and private key. The sender will be encrypting the message with receiver’s public key and the receiver will decrypt using its private key. Now, we have to select a number “d” within the range of “n”.

The public key can be generated by using the following equation:

Q = d * p (1)

Where, d = the random number that we have selected within the range of (1 to n-1).

P = the point on the curve.

Q = the public key and “d” is the private key.

Encryption

Let “m” be the message which has to be sent. We have to represent this message on the curve. Consider “m” as the point “M” on the curve “E”. Randomly select “k” from [1 – (n-1)].Cipher texts will be generated after encryption, let it be C1 and C2.

C1 = k * p – (2)

C2 = M + k * Q (3)

Decryption

The message “M” that was sent is written as following equation,

M = C2 – d * C1 – (4)

Proof

The message “M” can be obtained back using eq. (4)

C2 – d * c1 = (M + k * Q) – d * (k * p)

We have Q = d * p, by cancelling out k * d * p,

We get M (original message)

OBJECTIVES

  1. To identify the challenging security issues which has to be addressed in cloud computing.
  2. To identify what are the possible solutions to the security issues and challenges.
  3. To identify the constraints over the elliptic curve cryptography if any.
  4. 4To identify how elliptic curve cryptography algorithm can provide efficient data security and reliability for cloud computing and it is a mechanism which provides secure data encryption, decryption as well as secure shield against the theft and attacker.

METHODOLOGY

While several different methodologies are being developed in this rapidly emerging discipline, here we outline one that is particular. Table below shows the main stages of the methodology. In Step 1 we will develop a “concept statement”. This is a first cut at establishing the need for such a project. The concept statement is followed by a description of the project’s significance. Once the concept statement is approved, then we can proceed to Step 2, the proposal development stage. Here, more details are filled in. Based on the concept statement, several questions are

Table 1 Outline of Data Security in Cloud Computing with Elliptic Curve Cryptography

Step 1 Concept statement

  • Establish need for Elliptic Curve Cryptography for data security in Cloud Computing

Step 2 Proposal

  • What is the problem being addressed?
  • Why is it important and interesting?
  • Why Elliptic Curve Cryptography approach?
  • Background material

Step 3 Methodology

  • Propositions
  • Variable selection
  • Data collection
  • ETL and data transformation
  • Platform/tool selection
  • Conceptual model
  • Analytic techniques
  • -Association, clustering, classification, etc.

  • Results & insight

Step 4 Deployment

  • Evaluation & validation
  • Testing

infoRemember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism-free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Data Security in Cloud Using Elliptic Curve Cryptography. (2019, January 03). GradesFixer. Retrieved June 21, 2021, from https://gradesfixer.com/free-essay-examples/data-security-in-cloud-using-elliptic-curve-crytography/
“Data Security in Cloud Using Elliptic Curve Cryptography.” GradesFixer, 03 Jan. 2019, gradesfixer.com/free-essay-examples/data-security-in-cloud-using-elliptic-curve-crytography/
Data Security in Cloud Using Elliptic Curve Cryptography. [online]. Available at: <https://gradesfixer.com/free-essay-examples/data-security-in-cloud-using-elliptic-curve-crytography/> [Accessed 21 Jun. 2021].
Data Security in Cloud Using Elliptic Curve Cryptography [Internet]. GradesFixer. 2019 Jan 03 [cited 2021 Jun 21]. Available from: https://gradesfixer.com/free-essay-examples/data-security-in-cloud-using-elliptic-curve-crytography/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! This essay is not unique. You can get a 100% Plagiarism-FREE one in 30 sec

    Receive a 100% plagiarism-free essay on your email just for $4.99
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer
    exit-popup-close

    Haven't found the right essay?

    Get an expert to write you the one you need!

    exit-popup-print

    Professional writers and researchers

    exit-popup-quotes

    Sources and citation are provided

    exit-popup-clock

    3 hour delivery

    exit-popup-persone