An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2

Abstract

"Cloud Computing with Elliptic Curve Cryptography (ECC) is an entirely novel area and has inconceivable scope of research. It is a talented saleable infrastructure archetype that promises to exterminate require for maintaining exclusive computing amenities by companies and institutes comparable. It has obsessed insubstantial, technical, economic, and client experience characteristics. All through the use of virtualization and resource time allocation, clouds provide with a testing position of physical resources a gargantuan client base with dissimilar requirements. However, a user uses public network for the duration of right of entry of cloud services at the same time an adversary knows how to get full control over the public network. Therefore, a user ought to advocate a mechanism in which user and server can authenticate each other and generate a safe session. In this projected protocol, user and server established a session key and can communicate securely through the public network. This recently protocol decreases the cost of computation deeply and compared with previous existing protocol. Detailed network security investigations have been made to authenticate the proficiency of the protocol. Additional, this protocol has the argument to likely attacks in cloud computing. "

Authors and Affiliations

Keywords

Related Articles

Enhancing Recommendation on Customizable E-Commerce System with Association & Ranking

The propose system is a web recommender that models user habits and behaviors by constructing a knowledge base using temporal web access patterns as input. The rapid growth of e-commerce has caused product overload where...

Attitude Towards Teaching Profession in Relation to Adjustment among Senior Secondary School Teachers

"Abstract The present study aims at studying the levels of attitudes towards teaching profession in relation to adjustment of senior secondary school teachers. For this purpose a sample is taken which is the representati...

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Cryptographic protocols for key exchange have an aim of secure exchange of secret keys over the public network. Password based authenticated key exchange (PAKE) protocols are popularly used for communication purposes due...

A Case Report of Epidermal Cyst of the Eyelid

Epidermal cyst of the eyelid in itself is of rare occurrence. It is frequently seen on the upper eyelid either on the conjunctiva or skin surface. More common in men, either in 2nd and 3rd decade. It is usually asymptoma...

Improvement of Brain Tumors Detection Using Markers and Boundaries Transform

This was experimental study conducted to study segmentation of brain in MRI images using edge detection and morphology filters. For brain MRI images each film scanned using digitizer scanner then treated by using image p...

Download PDF file
  • EP ID EP355012
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

(2015). An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing. International Journal of Science and Research (IJSR), 4(2), -. https://europub.co.uk/articles/-A-355012