Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. With a promising technology like this, it certainly abdicates users’ privacy, putting new security threats towards the certitude of data in cloud. The security threats such as maintenance of data integrity, data hiding and data safety dominate our concerns when the issue of cloud security come up. In this research paper, we have contemplated a design for cloud architecture which ensures secured movement of data at client and server end. We have used the non breakability of Elliptic curve cryptography (ECC) with ones compliment for data encryption, proposed algorithm is based on 1’s complement subtraction to represent scalar in scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency. It has three security checkpoints: authentication, key generation and encryption of data.

Authors and Affiliations

Anusha K. P , Dr. Pritam Gajkumar Shah

Keywords

Related Articles

 An Efficient Texture Classification Technique Based on Semi Uniform LBP

 Abstract: ‘Local Binary Pattern’ (LBP) operator has been proved to be a theoretically simple yet very effective statistical texture descriptor in many areas. One of the main disadvantage of LBP is they are more sen...

 Optimization Techniques Incorporating Evolutionary Model inWireless Sensor Network: A Survey

Abstract: Wireless Sensor Network has several issues and challenges that are to be taken care while designing the techniques and algorithms to increase the Network lifetime of WSN. Network optimization is a critical comp...

 IOG - An Improved Approach to Find Optimal Grid Size Using Grid Clustering Algorithm

Abstract: The grid-clustering algorithm is the most important type in the hierarchical clustering algorithm. The grid-based clustering approach considers cells rather than data points. In grid-based clustering, all the c...

Mobile Streaming: Android Based Mobile Tv

Cloud computing is an emerging technology aimed at providing various computing and storage services over the Internet. Multimedia cloud computing is generally related to multimedia computing over grids, content delivery,...

 Test Exude: Approach for Test Case Reduction

 Abstract : Software development is a planned and structured process includes research, new development, modification, re-engineering results in software products. The structure of development of software is SDLC. I...

Download PDF file
  • EP ID EP94342
  • DOI 10.9790/0661-1632107112
  • Views 138
  • Downloads 0

How To Cite

Anusha K. P, Dr. Pritam Gajkumar Shah (2014). Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 107-112. https://europub.co.uk/articles/-A-94342