Enhanced Security at Cloud Data with AES and ECC Cryptographic Algorithm
IT Skills Show & International Conference on Advancements in Computing Resources, (SSICACR-2017) 15 and 16 February 2017, Alagappa University, Karaikudi, Tamil Nadu, India. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Data privacy protection and data retrieval control are the challenging issues to be addressed in cloud computing. The paper presents away to provide the safety and security to the user?s data, a Data security model that uses both AES and ECC Algorithm is proposed. By applying AES algorithm for digital signature on the message digestinstead of on the whole data to make the computations faster. Elliptic Curve Cryptography (ECC) was discovered as a mechanism for implementing public-key cryptography. In this work both digital signature scheme and public key cryptography are integrated to enhance the security level of Cloud.
 Yashpalsinh Jadeja, Kirit Modi," Cloud Computing - Concepts, Architecture and Challenges", 2012 International Conference on Computing, Electronics and Electrical Technologies, 978-1-4673-0210-4/12/.
 M.R Tribhuwan, V.A Buyar, Shabana pirzade,"Ensuring data security in Cloud Computing through Two-Way Handshake Based on token Management",2010 International Conference on Advances in Recent Technologies in Communication and Computing,978-0-7695-4201-0/10.
 P. Syam Kumar, R. Subramanian and D. Thamizh Selvam," Ensuring Data Storage Security in Cloud Computing using Sobol Sequence",2010 1st International Conference on Parallel, Distributed and Grid Computing, 978-1-4244-7674-9/10.
 Uma Somani, Kanika Lakhani, Manish Mundra, " Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing",2010 1st International Conference on Parallel, Distributed and Grid Computing, 978-1-4244-7674-9/10.
 M. Auxilia, K. Raja,"A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing'', 2012 International Conference on Radar, Communication and Computing, 978-1-4673-2758-9/12.
 Feng-qing Zhang, Dian-Yuan Han, "Applying Agents to the Data Security in Cloud Computing", 2012 International Conference on ComputerScience and Information Processing,978-1-4673-1411-4/12.
 Shuai Han, Jianchuan Xing," Ensuring Data Storage Security througha Novel Third Party Auditor Scheme In Cloud Computing"Proceedingsof IEEE CCIS2011, 978-1-61284-204-2/11.
Data security, Hashing, AES algorithm, Digital Signature, ECC algorithm.