Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. With a promising technology like this, it certainly abdicates users’ privacy, putting new security threats towards the certitude of data in cloud. The security threats such as maintenance of data integrity, data hiding and data safety dominate our concerns when the issue of cloud security come up. In this research paper, we have contemplated a design for cloud architecture which ensures secured movement of data at client and server end. We have used the non breakability of Elliptic curve cryptography (ECC) with ones compliment for data encryption, proposed algorithm is based on 1’s complement subtraction to represent scalar in scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency. It has three security checkpoints: authentication, key generation and encryption of data.

Authors and Affiliations

Anusha K. P , Dr. Pritam Gajkumar Shah

Keywords

Related Articles

 MAC Protocols: A Review

 Mobile adhoc networks (MANETS) are infrastructureless networks which uses radio signals, to establish communication among mobile nodes. MANET media is open shared media, multiple mobile nodes may  access the...

A Survey on Secure Key Policy Attribute-Based Encryption Policy for Data Sharing Among Dynamic Groups in the Cloud

Profited from distributed computing, clients can accomplish a powerful and sparing methodology for information sharing among gathering individuals in the cloud with the characters of low support and little administration...

 Enhancing The Ic Engine Performance By Using The ElectrolysisAnd Preheating Process

 Abstract:Our present fuel resources are not going to be around forever and with the ever increasing consumption their extinction is nearly unavoidable. Also our fuel resources which are mostly made up of fossil f...

 A New Web Document Retrieval Method Using Extended-IOWA (Extended-Induced Ordered Weighted Averaging) Operator on HTML Tags

Abstract: A new scenario has arisen into the information retrieval (IR) field with the increase in the use of mark-up languages. This paper targets structured IR and is focused on documents with structure. This assumptio...

 Analysis of Bus Tracking System Using Gps on Smart Phones

Abstract: Public transport networks (PTNs) are difficult to use when the user is unfamiliar with the area they are traveling to. This is true for both infrequent users (including visitors) and regular users who need to t...

Download PDF file
  • EP ID EP94342
  • DOI 10.9790/0661-1632107112
  • Views 118
  • Downloads 0

How To Cite

Anusha K. P, Dr. Pritam Gajkumar Shah (2014). Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 107-112. https://europub.co.uk/articles/-A-94342