Abstract

This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure simply focuses on the communication interaction of the Cloud providing communities and a pictured Smartphone user. The Elliptic Curve Cryptosystem is envisioned as the basic framework for data transmission security in the paper that proffers solution. We reviewed various literatures on the elliptic curves and applied the cyclic elliptic curve group based-on finite field modulo q. With the theory established, we applied the Elliptic Curve Digital Signature Algorithm as developed by ElGamal to carry out some exemplified computational sequences. The detail of the computational algorithm was done in Mathematica as given by (Jouko, 2011) with no modifications except in its translational interpretation to fit into cloud computing security environment as maybe applied by the cloud providing communities to accelerate and meeting the needs of the users on-demand as a service with embedding security consideration. Our contribution to the cloud computing environment is brought about through computational experimental activities as exemplified in this field for interactive security awareness through digital signature authenticating mechanism.

Highlights

  • Cloud Computing is the modern paradigm that is synonymous with grid computing

  • This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA)

  • The detail of the computational algorithm was done in Mathematica as given by (Jouko, 2011) with no modifications except in its translational interpretation to fit into cloud computing security environment as maybe applied by the cloud providing communities to accelerate and meeting the needs of the users on-demand as a service with embedding security consideration

Read more

Summary

Introduction

Cloud Computing is the modern paradigm that is synonymous with grid computing (which is based on the resources sharing, and making collaboration in the distribution of services between different enterprises in different geographical zones through the Internet providers). Cloud computing enhances the distribution of services for the Internet users. It is a computing mission on resource pools that include a large amount of computing resources. Most computing systems provide digital identity for the users to access their services; these bring some inconveniences for hybrid cloud that includes multiple private and public clouds. The Cloud Computing systems that provide services to the Internet users apply the asymmetric or public key and private or traditional identity based cryptography that has some identity elements that fit well in the requirement of cloud computing.

Cloud Computing Features and Model of Services
Cloud Characteristics or Features
Cloud Solutions
Clients of Cloud Computing Services
Some Prevalent Security Challenges in Cloud Computing Environment
Security as a Result of Network Infrastructure
Security Risk Due to the Web Services
Security Issues of Applications Available over the Cloud
Cloud Computing from Practical Analysis
Proposed Solutions
Elliptic Curve Cryptography
The Background of ECC
ECDSA Signature Verification
Computational Experiments
Conclusion and Suggestion for Future Works

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.