Abstract

A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The user has access to the data anywhere and at any time. However, the data over the cloud do not remain secure all the time. Since the data are accessible to the end user only by using the interference of a third party, it is prone to breach of authentication and integrity of the data. Moreover, cloud computing allows simultaneous users to access and retrieve their data online over different Internet connections, which leads to the exposure, leakage, and loss of a user’s sensitive data in different locations. Many algorithms and protocols have been developed to maintain the security and integrity of the data using cryptographic algorithms such as the Elliptic Curve Cryptography (ECC). This paper proposes a secure and optimized scheme for sharing data while maintaining data security and integrity over the cloud. The proposed system mainly functions by combining the ECC and the Advanced Encryption Standard (AES) method to ensure authentication and data integrity. The experimental results show that the proposed approach is efficient and yields better results when compared with existing approaches.

Highlights

  • Cloud computing has been one of many distinguished computing models that provides numerous services irrespective of the location and medium, accessible at any location, such as unlimited database storage, networks and communications, and others.Its attractive features have led to an ever-increasing reliance on the cloud, leading to a massive volume of data and raising privacy and security concerns

  • Data can be stored, managed, improved, and accessed through a cloud interface provided by third party cloud service providers via the Internet with minimal effort regardless of the location of the user

  • Users are the people who are using the services depending on the kind of cloud services

Read more

Summary

Introduction

Cloud computing has been one of many distinguished computing models that provides numerous services irrespective of the location and medium, accessible at any location, such as unlimited database storage, networks and communications, and others. Cryptographic methods are primarily employed to secure the data over the cloud by applying encryption/decryption techniques with the help of different keys. Elliptic Curve Cryptography (ECC) is based on asymmetric key encryption [3], and it outperforms other cryptographic methods with its primary feature of providing higher security with smaller key size compared to other existing schemes like the Rivest–Shamir–Adleman (RSA) algorithm [2], which is based on asymmetric cryptography algorithm leading to smaller latency and lesser computational/hardware complexities. We proposed a hybrid model of AES and ECC for the security of data over cloud storage without involving a third party. The proposed hybrid model (AES-ECC) is used to maintain the security of the system over cloud storage efficiently. Different cloud systems are classified in different deployment models which are as follows [5]: Public cloud service (For all)

Cloud Computing Characteristics
Pooling
Cryptographic Cloud Services
Problem Statement
Contributions
Related Work
Limitations
Research Methodology
Defining ECC and AES
ECC and AES—A Combined Hybrid Proposed Approach
Encryption and Decryption by Using Advanced Encryption Standard
Experimental Results and Discussion
Advantages of ECC and AES
Graphical
Exchange
Methods
Data Size for Proposed Scheme
Performance Analysis
Decryption Time
Avalanche Effect
Power Consumption
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call