Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. With a promising technology like this, it certainly abdicates users’ privacy, putting new security threats towards the certitude of data in cloud. The security threats such as maintenance of data integrity, data hiding and data safety dominate our concerns when the issue of cloud security come up. In this research paper, we have contemplated a design for cloud architecture which ensures secured movement of data at client and server end. We have used the non breakability of Elliptic curve cryptography (ECC) with ones compliment for data encryption, proposed algorithm is based on 1’s complement subtraction to represent scalar in scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency. It has three security checkpoints: authentication, key generation and encryption of data.

Authors and Affiliations

Anusha K. P , Dr. Pritam Gajkumar Shah

Keywords

Related Articles

 Modern Computer Implementation on Smart Phone withAndroid Platform for Smes (UMKM) in Optimization ServicesDistrict Malang

Abstract: The use of Android in the smartphone operating system currently used by many companies. Because of its superiority as a software that uses computer code base that can be distributed openly (open source) so many...

 Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator

 Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extende...

 SQL Injection Prevention by Adaptive Algorithm

 Abstract: An SQL Injection is one of the most dangerous security issues. SQL injections are dangerous becausethey are a door wide open to hackers to enter your system through your Web interface and to do whatever t...

 Automatic Determination Number of Cluster for NMKFC-MeansAlgorithms on Image Segmentation

 Abstract: Image segmentation plays an important role in image analysis. Image segmentation is useful in manyapplications like medical, face recognition, crop disease detection, and geographical object detection in...

 Modified Rabin Cryptosystem through Advanced Key Distribution System

 Abstract: In this paper, an asymmetric cryptosystem Rabin Cryptosystem has been modified by adding an advanced message authentication system with it. The proposed modified Rabin Cryptosystem is a combination of sym...

Download PDF file
  • EP ID EP94342
  • DOI 10.9790/0661-1632107112
  • Views 157
  • Downloads 0

How To Cite

Anusha K. P, Dr. Pritam Gajkumar Shah (2014). Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 107-112. https://europub.co.uk/articles/-A-94342