Abstract
This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure simply focuses on the communication interaction of the Cloud providing communities and a pictured Smartphone user. The Elliptic Curve Cryptosystem is envisioned as the basic framework for data transmission security in the paper that proffers solution. We reviewed various literatures on the elliptic curves and applied the cyclic elliptic curve group based-on finite field modulo q. With the theory established, we applied the Elliptic Curve Digital Signature Algorithm as developed by ElGamal to carry out some exemplified computational sequences. The detail of the computational algorithm was done in Mathematica as given by (Jouko, 2011) with no modifications except in its translational interpretation to fit into cloud computing security environment as maybe applied by the cloud providing communities to accelerate and meeting the needs of the users on-demand as a service with embedding security consideration. Our contribution to the cloud computing environment is brought about through computational experimental activities as exemplified in this field for interactive security awareness through digital signature authenticating mechanism.
Highlights
Cloud Computing is the modern paradigm that is synonymous with grid computing
This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA)
The detail of the computational algorithm was done in Mathematica as given by (Jouko, 2011) with no modifications except in its translational interpretation to fit into cloud computing security environment as maybe applied by the cloud providing communities to accelerate and meeting the needs of the users on-demand as a service with embedding security consideration
Summary
Cloud Computing is the modern paradigm that is synonymous with grid computing (which is based on the resources sharing, and making collaboration in the distribution of services between different enterprises in different geographical zones through the Internet providers). Cloud computing enhances the distribution of services for the Internet users. It is a computing mission on resource pools that include a large amount of computing resources. Most computing systems provide digital identity for the users to access their services; these bring some inconveniences for hybrid cloud that includes multiple private and public clouds. The Cloud Computing systems that provide services to the Internet users apply the asymmetric or public key and private or traditional identity based cryptography that has some identity elements that fit well in the requirement of cloud computing.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.