Abstract

Cloud computing is technology based on the internet. Computing actually took place on a computer that is not the one currently being used, mostly remote. Data obtained during this process is stored by remote servers and processed by them. Cloud encryption is required because, when it is distributed via the Internet and other computer networks, its main purpose is to safeguard and protect sensitive information. Providers of cloud storage encrypt data and transfer the user’s encryption keys. When required, these keys are used to securely decrypt data. Many studies have argued a variety of cryptographic techniques to preserve the privacy and security of user data stored in the cloud. In this paper, to encrypt the data, an effective privacy protection scheme called Elliptic Curve Cryptography (ECC) is proposed. Uploading encrypted files and indexes to a cloud server will reduce the computing cost of encryption and decryption. It will then allow users to use the hash conflict feature to create trap door and send it to the cloud service provider to search for matched ciphertext. Experiments show that, by using this process, files can be encrypted, decrypted, and retrieved more easily compared to conventional methods. It can also maintain data protection and decrease the overhead for communication.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.