Improving Data Storage Security in Cloud Computing UsingElliptic Curve Cryptography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which areproviding by cloud computing. The cloud computing is a way to deliver IT services on demand and pay perusage, and it can stores huge amount of data. But until now many companies don’t wish to use cloud computingtechnology due to concerns about data secrecy and protection. This paper aims to provide a secure, effective,and flexible method to improve data storage security in cloud computing. By using IBC the key managementcomplexity will decrease and not need to certificate issued, also the use of ECC provides data confidentialityand use ECDS provides data integrity
Authors and Affiliations
Asst. Prof. Dr. Salim Ali Abbas AmalAbdulBaqiMaryoosh
A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver
Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todeman...
Thorny Issues of Stakeholder Identification and Prioritization in Requirement Engineering Process
Identifying the stakeholder in requirement engineering process is one of the critical issues. It performs a remarkable part for successful project completion. The software project largely depends on several  ...
Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control
Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...
Sequential Pattern Tree Mining
Sequential pattern mining, which discovers the correlation relationships from the ordered list of events, is an important research field in data mining area. In our study, we have developed a Sequential Patter...
Methods of Gathering Data for Research Purpose and Applications Using IJSER Acceptance Rate of Monthly Paper Publication (March 2012 Edition-May 2013 Edition)
A good number of scientist or researchers find it very difficult in carrying out their research work successfully due to lack of good knowledge of data collection method and application. Data is referred to as a...