Book Details

Security using Elliptic Curve Cryptography (ECC) in Cloud

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format

Abstract

The Elliptic Curve Cryptography (ECC) is modern family of public-key cryptosystems, you can use an elliptic curve algorithm for public/private key cryptography. To be able to use ECC; cryptographic signatures, hash functions and others that help secure the messages of files are to be studied at a deeper level. It implements all major capabilities of the asymmetric cryptosystems: Encryption, Signatures and key exchange. The main advantage is that keys are a lot smaller. With RSA you need key servers to distribute public keys. With Elliptic curves, you can provide your own public key. Using public key cryptosystems with both public & private key can give security for data compare to single key encryption. In this project ECC algorithm is used for security data to cloud and uploading data to cloud.

References

[1] Elliptic curve cryptography, https://en.wikipedia. org/wiki/Elliptic_curve_cryptography.
[2] RSA (algorithm), http://en.wikipedia.org/wiki/RSA_ (algorithm).
[3] Chakraborty, T.K.; Dhami, A.; Bansal, P.; Singh, T. “Enhanced public auditability & secure data storage in cloud computing”. 3rd IEEE International Advance Computing Conference (IACC), 2013.
[4] W.Diffie and M. Hellman.” New Directions in Cryptography”. IEEE transactions on Information Theory. IT-22(1978).472- 492.

Keywords

Elliptic Curve Cryptography, Encryption, RSA, Public, Private Key.

Image
  • Format Volume 10, Issue 1, No 2, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Mohamed Amin Abdiaziz Hussein, Dr. A. Sivakumar
  • Reference IJCS-395
  • Page No 2719-2721

Copyright 2024 SK Research Group of Companies. All Rights Reserved.