18,746 research outputs found

    Cloud Data Security Using Elliptic Curve Cryptography

    Get PDF
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue in effective execution of Cloud Computing is to adequately deal with the security in the cloud applications. This paper talks about the part of cryptography in cloud computing to improve the data security. The expectation here is to get bits of knowledge another security approach with the usage of cryptography to secure information at cloud data centers

    Application of Elliptical Curve Cryptography in Empowering Cloud Data Security

    Get PDF
    Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography. The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give access to the encryption keys stored in cloud

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view

    A Review on Progress and Problems of Quantum Computing as a Service (QCaaS) in the Perspective of Cloud Computing

    Get PDF
    Cloud computing is a global established system Quantum computing is hypothetical model which is still in tentative analysis Cloud system has some weakness in security processing backup and vicinity Somehow quantum computing illustrates some revolutionary solution to overcome cloud weakness Most researchers are optimistic in quantum computing that it will improve cloud system It is not easy to combine these two different systems along We will show two quantum approaches quantum cryptography and blind quantum computing to secure cloud computing Quantum cryptography will secure the user data transmission and communication through cloud form hackers And blind computing will secure the instant eavesdropping or accessing of data processing in cloud from any vicious cloud provider or third party This paper s major target is to show advantages and disadvantages of quantum computing in the viewpoint to integrate it with cloud system Also review some current improvement of quantum computing and compute

    Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm

    Get PDF
    Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.   

    Data Security in Cloud for Medical Sciences using AES 512-bit Algorithm

    Get PDF
    Cloud computing is typically defined as a type of evaluation that relies on sharing computing resources to handle applications. There is a requirement to redesign the medical system to meet their better needs among the growing technologies .With the initiation of cloud computing the doctors can keep their information about the latest diseases, emergency cases and complex problems. However the privacy and security of data is extremely exigent. To guarantee privacy and security of data in cloud computing, we have proposed an effective approach for data security by the process of encrypting and decrypting the data through the concept of cryptography. In this paper the proposal is to prevent data access from cloud data storage centers by unauthorized access using AES-512 bit algorithm with key size and input block size of 512-bits that makes it more defiant to cryptanalysis. DOI: 10.17762/ijritcc2321-8169.16040

    Integrated ECC and Blowfish for Smartphone Security

    Get PDF
    AbstractMobile Cloud Computing is the hottest research area in the IT world. Security and privacy are key issues in MCC. Hence, framework required to provide the security with minimum computational overhead. We develop the scheme to secure the mobile data in cloud using cryptography, in which Elliptic Curve Cryptography and Blowfish algorithm are integrated to provide authentication and confidentiality. To transmit the data more securely, random number is used to increase computational complexity for an adversary. We also randomize the number of rounds of Blowfish for performance improvement. Our approach is implemented and tested with different platforms like personal computer, android emulator, smartphone and aakash tablet

    Security Enhancement on Cloud to multi Cloud using Audio Cryptography

    Get PDF
    Nowadays, cloud computing is most popular and modern technology of storing the large amount of information on the internet and accessing it from anywhere. Costs reduction, universal access, availability of number of applications and flexibility is a number of reasons for popularity of cloud computing. Users store sensitive information on cloud, providing security becomes important aspect as these cloud service providers cannot be trusted one. As the cloud computing assures user to provide the data, the cloud computing environment failure may result in loss or unavailability of data so the concept of Multi-Clouds is introduces. Dealing with single cloud” service providers are anticipated to become infamous with customers due to scare of service availability failure and the possibility of malicious intruders in the individual cloud. Multi-clouds guarantee to provide service at any cost if there is any failure at any cloud due to any reason. The use of multi-clouds as it can tackle the security and mainly availability issues much effectively than single cloud that affects cloud computing user. The proposed work surveys recent research related to single and multi cloud security and addresses possible solutions. This work aims to promote the use of multi clouds to solve problem of data availability due to failure in individual cloud. To provide data confidentiality as well as data integrity, security mechanism which uses an image audio secret sharing scheme(ASS) cryptography instead of visual secret sharing scheme(VSS)

    Framework to establish offline file sharing in Application as a service layer in cloud computing

    Get PDF
    Term cloud computing has opened entire new domain of computability, reliability and efficiency. Organizations can now focus on providing targeted services to consumers rather than considering infrastructure and resource issues. Cloud consumers can enjoy ease of computing and power of reliability but cloud service providers have to ensure many measures to let cloud services be reality and reliable. Consumers can store their valuable data on cloud and can use them as and when required. This leads to some key points like security of cloud data should be considered, sharing of cloud data as per requirement should be done. Allocation of required resources to the consumers should be done efficiently and above all, cloud service providers should have opportunity to gain some economical values. This research paper is based on providing some mechanism to allow file sharing among various cloud users. This paper proposed a framework that can be followed to easily share file residing on cloud with another cloud user. In this framework, concept of cryptography has been used to generate secure key that can be shared among users. Cryptography allows encryption and decryption of different normal text to some cipher text that cannot be interpreted easily. This paper has proposed secure mechanism of generating key, sharing a key and validating use of key for given file. Most important aspect considered in this research paper is, the user who owns a file and wants to provide access to other user don’t have internet access at hand. Framework uses mobile technology to contact service providers and generate a key as and when needed. Keywords— Cloud computing, cryptography, AES, RSA, Security, Authentication, Validation, Application as a servic
    • …
    corecore