Open Access   Article Go Back

Hybrid Elliptic Curve Cryptography for Secured Cloud Computing

G. Sakthivel1 , P. Madhubala2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 707-719, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.707719

Online published on Jan 31, 2019

Copyright © G. Sakthivel, P. Madhubala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Sakthivel, P. Madhubala, “Hybrid Elliptic Curve Cryptography for Secured Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.707-719, 2019.

MLA Style Citation: G. Sakthivel, P. Madhubala "Hybrid Elliptic Curve Cryptography for Secured Cloud Computing." International Journal of Computer Sciences and Engineering 7.1 (2019): 707-719.

APA Style Citation: G. Sakthivel, P. Madhubala, (2019). Hybrid Elliptic Curve Cryptography for Secured Cloud Computing. International Journal of Computer Sciences and Engineering, 7(1), 707-719.

BibTex Style Citation:
@article{Sakthivel_2019,
author = {G. Sakthivel, P. Madhubala},
title = {Hybrid Elliptic Curve Cryptography for Secured Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {707-719},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3571},
doi = {https://doi.org/10.26438/ijcse/v7i1.707719}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.707719}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3571
TI - Hybrid Elliptic Curve Cryptography for Secured Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - G. Sakthivel, P. Madhubala
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 707-719
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
526 272 downloads 135 downloads
  
  
           

Abstract

This paper presents a secure cloud storage scheme based on hybrid cryptosystem, which consists of Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), and one-way hash function. Here, the data owner exports large volume of encrypted data to a cloud storage provider, the Electronic cryptography is a public key or asymmetric key means that the encryption key and decryption key are different. In many applications like military databases confidential video conferencing, medical imaging system, online personal photograph album security is very essential. Also, in industrial process wide usage of images can turn it into a resource and asset. So, it is important to protect confidential images data from unauthorized access. this paper proposes elliptical curve cryptography-based security mechanism and ant colony optimization based secured key management technique. The proposed system provides better space complexity than existing RSA and CRT, and the ACO improves optimality

Key-Words / Index Term

cloud computing, security, RSA algorithm, elliptic curve cryptography, ant colony optimization

References

[1]. Wang You-Bo, Dong Xiang-Jun, Tian Zhi-Guang. “ FPGA Based Design of Elliptic Curve Cryptography Coprocessor”, Third International Conference on Natural Computation,vol.5, pp. 185-189,2007
[2]. Jarvinen K., Skytta J. “ On Parallelization of High Speed Processors for Elliptic Curve Cryptography”, In Proceedings of IEEE International conference on Very Large Scale Integration Systems, vol.16(9),pp.1162-1175,2008
[3]. L.Y. Li and Y. Xiang. “Research of Multi-Path Touting Protocol Based on Parallel Ant Colony Algorithm Optimization in Mobile Ad Hoc Networds”, In Proceedings of International Conference on Information Technology,pp.1006-1010, 2008.
[4]. Han L. and Berry D. “Semantic-Supported and Agent Based Decentralized Grid Resource Discovery”, Computer Journal of Future Generation Computer Systems, vol. 24(8),pp.806-812, 2008
[5]. Z. Zhang, X. Zhang. “Realization of open cloud computing federation based on mobile agent”, In proceedings of IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 3, pp. 642–646,2009
[6]. Athavale A.; Singh K.; Sood S. “Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography”, In proceedings of First International Conference on Computational Intelligence, Communication Systems and Networks, pp. 332-335,2009
[7]. Greenberg, J. Hamilton, D. A. Maltz and P. Patel. “The cost of a cloud: Research problems in data center networks”, Computer Commuication Review, vol. 39(1), pp.68 -73,2009
[8]. M. Armbrust. “A view of cloud computing” Journal of the Association for Computing Machinery, vol. 53, pp. 50- 58, 2010
[9]. Pathak H. and Sanghi M. “Speeding-up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem”, International Journal on Computer Science and Engineering, vol. 2, pp. 1024-1028, 2010.
[10]. Dinh HT, Lee C, Niyato D, Wang P. “A survey of mobile cloud computing: architecture, applications, and approaches” In Proceedings of the wireless communications and mobile computing,vol.13(8), pp.1587-1611,2011
[11]. Y. Zhang and J. Grobschadl. “Encient prime field arithmetic for elliptic curve cryptography on wireless sensor nodes.” In Proceedings of the International Conference on Computer Science and Network Technology , vol. 1, pp. 459-466, 2011
[12]. Chia-Feng Juang, Chun-Ming Lu, Chiang Lo and Chi-Yen Wang. “Ant Colony Optimization Algorithm for Fuzzy Controller Design and Its FPGA Implementation”, In proceedings of IEEE international conference on Plasma Science, vol. 39, 2011
[13]. Farah Mourad, Hicham Chehade, Hichem Snoussi, Farouk Yalaoui, Lionel Amodeo, C, Edric Richard. “Controlled Mobility Sensor Networks For Target Tracking Using Ant Colony Optimization”, In Proceedings of IEEE International conference On Mobile Computing, vol. 11, pp. 1261 – 1273, 2011
[14]. Hai Ming Jiang, Kang Xie and YaFei Wang. “Novel Design of Flat Gain Spectrum Raman Fiber Amplifiers Based On Ant Colony Optimization”, In Proceedings of IEEE International conference on Photonics Technology Letters, vol. 23, 2011
[15]. M. Jarschel, D. Schlosser, S. Scheuring and T. Hobfeld. “An evaluation of QoE in cloud gaming based on subjective tests”, In Proceedings of IEEE international conference on innovative mobile and internet services in Ubiquitous Computing, pp. 330-335, 2011
[16]. Mahamat Hassan. and Azween A. “A New Grid Resource Discovery Framework”, The International Arab Journal of Information Technology, vol. 8(1),pp. 99-107, 2011
[17]. X. W. Zhang, A. Kunjithapatham, S. Jeong and S. Gibbs. “Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing”, Mobile Networks & Applications, vol. 16(3), pp.270 -284,2011
[18]. LiLi, Ahmed A. Abd El-Latif and XiamuNiu. “Elliptic Curve ElGamal Based Homomorphic Image Encryption Scheme for Sharing Secret Images in Signal Processing”, Elsevier, vol. 92, pp. 1069–1078, 2012
[19]. S. Maria Celestin Vigila and K. Muneeswaran. “Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications”, International Journal of Network Security , vol. 14(4), pp. 236–242, 2012
[20]. Loai Tawalbeh, Moad Mowafi and Walid Aljoby. “Use of Elliptic Curve Cryptography for Multimedia Encryption”, IET Information Security ,vol. 7(2), pp. 67–74, 2012
[21]. S. Barber, X. Boyen, E. Shi, and E. Uzun. “Bitter to better - how to make bitcoin a better currency” ,Lecture Notes in Computer Science- Springer ,vol. 7397, pp. 399-414, 2012
[22]. Bai Qing-hai; Zhang Wen-bo; Jiang Peng; Lu Xu. “Research on Design Principles of Elliptic Curve Public Key Cryptography and Its Implementation”, International Conference on Computer Science and Service System, pp. 1224-1227,2012.
[23]. Y. Volkan Pehlivanoglu “A new vibrational genetic algorithm enhanced with a Voronoi diagram for path planning of autonomous UAV”, Aerospace Science and Technology, vol. 16, pp. 47-55, 2012.
[24]. Ratan Mishral, and Anant Jaiswal. “Ant colony Optimization: A Solution of Load balancing in Cloud”, International Journal of Web & Semantic Technology,vol. 3(2), 2012.
[25]. S.Dey. “Cloud mobile media: Opportunities, challenges, and directions”,In proceedings of International conference on Computing, networking and communications, pp.929 -933, 2012
[26]. R. Kokku, R. Mahindra, H. Zhang and S. Rangarajan. “NVS: A substrate for virtualizing wireless resources in cellular networks”, In Proceedings of IEEE International conference, vol. 20(5), pp.1333 -1346, 2012
[27]. Gao Y., Guan H., Qi Z., Hou Y., and Liu L, “A Multi-Objective Ant Colony System Algorithm for Virtual Machine Placement in Cloud Computing”, Journal of Computer and System Sciences, vol. 79(8), pp. 1230-1242, 2013.
[28]. S. F. Abbas. “Metric Base Analysis and Modeling Experiments of Routing Protocols in MANETs and VANETs Wireless Network using Real Time Scenarios”, International Journal of Computer Science Issues, vol. 10(5),2013.
[29]. Niroshinie Fernando,Seng W.Loke,Wenny Rahayu. “Mobile cloud computing: A survey”, Future Generation Computer Systems, vol.29 ,pp.84–106,2013
[30]. A. Ahmed, Abd El-Latif and XiamuNiu.“A Hybrid Chaotic System and Cyclic Elliptic Curve for Image Encryption”,International Journal of Electronics and Communications, Elsevier, vol. 67, pp. 136–143, 2013
[31]. H. Seo and H. Kim. “Optimized multi-precision multiplication for public-key cryptography on embedded microprocessors”, International Journal of Computer and Communication Engineering , vol. 2,pp. 255-259, 2013
[32]. Arshad R, Ikram N.“Elliptic curve cryptography based mutual authentication scheme for session initiation protocol”, Multimedia Tools and applications, vol. 66(2), pp. 165–178,2013
[33]. Ali Soleymani, Md Jan Nordin and Zulkarnain Md Ali. “A Novel Public Key Encryption based on Elliptic Curves Over Prime Group Field”, Journal of Image and Graphics , vol. 1, pp. 43–49, 2013
[34]. S. Behnia, A. Akhavan, A. Akhshani and A. Samsudin. “Image Encryption based on the Jacobian Elliptic Maps”, The Journal of System and Software, Elsevier, vol. 86, pp. 2429–2438, 2013
[35]. Irshad A, Sher M, Faisal MS, Ghani A, Ul Hassan M, Ashraf Ch S. “ A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme”, Security and communication Networks, vol. 7(8),pp. 1210–1218,2013
[36]. Sharma G, Bala S, Verma AK. “An identity-based ring signcryption scheme”, IT convergence and security, Springer, pp151–157,2013
[37]. Y., Wang, G., Chen, H., Shi, L., Qin, L. “An ant colony optimization based dimension reduction method for high-dimensional datasets”,Journal of Biological Engineering, vol. 10,pp. 231–241,2013
[38]. Baig, A.R.; Shahzad, W.; Khan, S. “ Correlation as a Heuristic for Accurate and Comprehensible Ant Colony Optimization Based Classifiers” In Proceedings of IEEE International conference on Evolutionary Computation, vol. 17(5),pp. 686 - 704,2013
[39]. Wei-Neng Chen; Jun Zhang , “Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler”, In Proceedings of IEEE International conference on Software Engineering,vol 39(1),pp. 1 – 17,2013
[40]. Zhanchang Yu, Sijia Zhang, Siyong Chen, Bingxing Liu, Shiqi Ye. “Research on Traveling Routes Problems Based on Improved Ant Colony Algorithm”, Communications and Network, vol. 5, pp. 606-610,2013
[41]. Lie Qu,Yan Wang,Mehmet A Orgun. “Cloud Service Selection Based on the Aggregation of User Feedback and Quantitative Performance Assessment”, In proceedings of IEEE international conference on services compurting, pp.152-159,2013.
[42]. Ijaz S., Munir E., Anwar W., and Nasir W. “Efficient Scheduling Strategy for Task Graphs in Heterogeneous Computing Environment”, The International Arab Journal of Information Technology, vol. 10(5), pp. 486-492, 2013
[43]. Guoyuan Linabd, Yuyu Biea, Min Leic, Kangfeng Zhengc. “A Behavior Trust Model in Cloud Computing Environment” International Journal of Computational Intelligence Systems, vol. 7(4), pp.785-795, 2014
[44]. Sultan Ullah, Zheng Xuefeng. “TCLOUD: A Trusted Storage Architecture for Cloud Computing” International Journal of Advanced Science and Technology, vol.63, pp.65-72, 2014
[45]. Mohammad Anagreh, AzmanSamsudin and MohdAdib Omar. “ Parallel Method for Computing Elliptic Curve Scalar Multiplication Based on MOF”, The International Arab Journal of Information Technology, vol. 11, pp. 521-525, 2014
[46]. Ting Liu, YangLiu, YashanMao, Yao Sun, XiaohongGuan, Weibo Gong, Sheng Xiao “A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication” In Proceedings of IEEE International conference on Trans Smart Grid, vol. 5(3), 2014
[47]. Hong Liu and Yanbing Liu. “Cryptanalyzing an Image Encryption Scheme based on Hybrid Chaotic System and Cyclic Elliptic Curve,In Optics and Laser Technology” , Elsevier, vol. 56, pp. 15–19, 2014
[48]. Akshay D. Kapse, Piyush K. Ingole“Secure and Efficient Search Technique in Cloud Computing”, In Proceedings of IEEE International conference on Communication systems and network technologies, pp.743-747,2014
[49]. Brohi S.N.. M.A. Bamiah, S. Chuprat and J.L.A. Manan. “Design and implementation of a privacy preserved off-premises cloud storage”, Journal of Computer science, vol.10,pp. 210-223,2014
[50]. R. Forsati, A. Moayedikia, R. Jensen, M. Shamsfard and M. R. Meybodi. “Enriched ant colony optimization and its application in feature selection”, Neurocomputing, vol. 142, pp.354 -371, 2014
[51]. Agnieszka Lazarowska. “Ant Colony Optimization based navigational decision support system”, Procedia Computer Science, vol. 35,pp 1013– 1022,2014
[52]. Tabakhi Sina, Parham Moradi and Fardin Akhlaghian. “An unsupervised feature selection algorithm based on ant colony optimization”, Engineering Applications of Artificial Intelligence, vol. 32, pp.112 -123, 2014
[53]. Huseyin Eldem, Erkan Ulker. “Application of Ant Colony Optimization for the Solution of 3 Dimensional Cuboid Structures”, Journal of Computer and Communications, vol. 2, pp. 99-107,2014
[54]. Smierzchalski R, Kuczkowski L. “Comparison of single and multi-population evolutionary algorithm for path planning in navigation situation”,ultra clean processing of silicon surfaces, vol. 210,pp.166-177,2014
[55]. Hsien-Kai Hsin; En-Jui Chang; Chia-An Lin; Wu, A.-Y.A. “Ant Colony Optimization-Based Fault-Aware Routing in Mesh-Based Network-on-Chip Systems”, Computer-Aided Design of Integrated Circuits and Systems, vol. 33(11), pp.1693-1705,2014
[56]. Sundus Shaukat, Riaz Ahmed Bhatti, Khalid Ibrahim Qureshi and Shafqat Ali Shad, “Ant Colony Optimization: A Review and Comparison” Research Journal of Applied Sciences, Engineering and Technology,vol.8(3),pp. 435-438, 2014
[57]. Luziane Ferreira de Mendonca. “An Approach for Personalized Social Matching Systems by Using Ant Colony” ,Social Networking, vol. 3,pp 102-107,2014
[58]. Bing quan Cheng “Cloud Service System Reliability Modeling, Electronic Product Reliability and Environment Testing”, vol. 32(2), pp.22 -27, 2014
[59]. Guoyuan Lin; Danru Wang; YuyuBie; Min Lei “MTBAC: A mutual trust based access control model in Cloud computing”, In Proceedings of IEEE International conference ,vol. 11(4),pp.154 – 162,2014
[60]. Heilig, L.; Vob, S. “A Scientometric Analysis of Cloud Computing Literature” , In Proceedings of IEEE International conference on Cloud Computing, vol. 2(3),2014
[61]. S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani and R. Buyya. "Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges", In Proceedings of IEEE International conference ,vol. 16(1), pp.337 -368, 2014
[62]. Y. Cai, F. R. Yu and S. Bu. “Cloud computing meets mobile wireless communications in next generation cellular networks”, In Proceedings of IEEE International conference ,vol. 28(6), pp.54 -59, 2014
[63]. Bamiah, Mervat Adib; Brohi, Sarfraz Nawaz; Chuprat, Suriayati& 2Jamalul-lail Ab Manan. “Trusted Cloud Computing Framework For Healthcare Sector”, Journal of Computer Science, vol. 10(2),pp. 240-250,2014
[64]. Atta ur Rehman Khan, Mazliza Othman ,Feng Xia ,Abdul Nasir Khan, “Context-Aware Mobile Cloud Computing and Its Challenges”, In Proceedings of IEEE International conference on Cloud Computing, vol. 2(3),pp. 42-49,2015
[65]. Laiphrakpam Dolendro Singh and KhumanthemManglem Singh. “Image Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, vol 54,pp. 472-481,2015
[66]. Christina Thomas ,Gnana Sheela K , Saranya P Krishnan. “An Efficient Elliptic Curve Scalar Multiplication using Karatsuba Multiplier”, International Journal of Engineering Research and General Science, vol. 3, pp. 1074-1086,2015
[67]. Medhat Tawfeek, Ashraf El-Sisi, ArabiKeshk and FawzyTorkey. “Cloud Task Scheduling Based on Ant Colony Optimization”, The International Arab Journal of Information Technology, vol. 12(2), March 2015
[68]. Mehdi Bahrami. “Cloud Computing for Emerging Mobile Cloud Apps” In proceedings of IEEE international conference, pp. 4-5,2015
[69]. C. Aguero, N. Koenig, I. Chen, H. Boyer, S. Peters, J. Hsu, B. Gerkey, S. Paepcke, J. Rivero, J. Manzo, E. Krotkov, and G. Pratt. “Inside the Virtual Robotics Challenge: Simulating Real-time Robotic Disaster Response”, In Proceedings of IEEE International conference on Automation Science and Engineering ,vol. 12(2), 2015.
[70]. Zhiyuan Yin; Yu, F.R.; Shengrong Bu; Zhu Han. “Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing Environments With Telecom Operator Cloud” In Proceedings of IEEE International conference on Wireless Communications,vol.14(7), pp.4020-4033,2015
[71]. Brown, Michael, et al. Software implementation of the NIST elliptic curves over prime fields. Springer Berlin Heidelberg, 2001.
Cohen, Henri, Atsuko Miyaji, and Takatoshi Ono. "Efficient elliptic curve exponentiation using mixed coordinates." Advances in Cryptology—ASIACRYPT’98. Springer Berlin Heidelberg, 1998