Efficient Elliptic Curve Cryptography Encryption Framework for Cloud Computing


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Cloud computing has benefited significantly from the ever-increasing capabilities of computer hardware, including faster microprocessors, larger memory capacity, and greater network bandwidth with high storage. This trend is expected to continue. Cloud computing enables the addition of colored displays to full-blown Web browsers. Some processes add embedded cloud warnings to investigate how data are stored on a local or intermediary system. For instance, all log files of a cloud computing server upload or download data, and all the sessions are stored in clear, unencrypted text on a local computer that multiple users have access to. The cloud client encrypts sessions with the standard method; however, the server does not fully protect such sessions. A high scheme with low-cost encryption and an elliptic curve is established in this study to solve this issue. A lookup table is integrated into the proposed framework.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Cloud Public Key; Community Cloud Computing

Full Text:

PDF


References


Y. Han, “On the clouds: a new way of computing,” Information Technology and Libraries, vol. 29, no. 2, pp. 87-92, 2013.

L. Ferretti, F. Pierazzi, M. Colajanni, and M. Marchetti, "Security and Confidentality Solutions for Public Cloud Database Services." pp. 36-42.

C. RADUT, I. POPA, and D. CODREANU, “CLOUD COMPUTING SECURITY,” REVISTA ECONOMICĂ, pp. 171.

A. Alwabel, R. Walters, and G. Wills, "Towards a volunteer cloud architecture," Computer Performance Engineering, pp. 248-251: Springer, 2013.

I. T. Foster, and R. K. Madduri, "Science as a service: how on-demand computing can accelerate discovery." pp. 1-2.

I. Sommerville, “Teaching cloud computing: a software engineering perspective,” Journal of Systems and Software, 2013.

A. Sahai, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings: Springer, 2013.

M. Drašar, J. Vykopal, and P. Winter, “Flow-based Brute-force Attack Detection,” 2013.

M.-S. Hwang, I.-C. Lin, and K.-F. Hwang, “Cryptanalysis of the batch verifying multiple RSA digital signatures,” Informatica, vol. 11, no. 1, pp. 15-19, 2000.

N. Koblitz, “Elliptic curve cryptography,” Mathematics of Computation, vol. 48, no. 177, 1987.

M. A. Vouk, S. F. Averitt, P. Dreher, D. H. Kekas, A. Kurth, M. I. Hoit, P. Mugge, A. Peeler, H. E. Schaffer, and E. D. Sills, “Constructing next generation academic cloud services,” International Journal of Cloud Computing, vol. 2, no. 2, pp. 104-122, 2013.

Chakraborty, T.K.; Dhami, A.; Bansal, P.; Singh, T., "Enhanced public auditability & secure data storage in cloud computing," Advance Computing Conference (IACC), 2013 IEEE 3rd International , vol., no., pp.101,105, 22-23 Feb. 2013.

D. J. Bernstein, P. Birkner, M. Joye, T. Lange, and C. Peters, "Twisted edwards curves," Progress in Cryptology–AFRICACRYPT 2008, pp. 389-405: Springer, 2008.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize