Open Access   Article Go Back

Data Protection Using Elliptic Curve Cryptography

M. Subhashini1 , P. Srivaramangai2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-02 , Page no. 134-138, Jan-2019

Online published on Jan 31, 2019

Copyright © M. Subhashini, P. Srivaramangai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Subhashini, P. Srivaramangai, “Data Protection Using Elliptic Curve Cryptography,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.134-138, 2019.

MLA Style Citation: M. Subhashini, P. Srivaramangai "Data Protection Using Elliptic Curve Cryptography." International Journal of Computer Sciences and Engineering 07.02 (2019): 134-138.

APA Style Citation: M. Subhashini, P. Srivaramangai, (2019). Data Protection Using Elliptic Curve Cryptography. International Journal of Computer Sciences and Engineering, 07(02), 134-138.

BibTex Style Citation:
@article{Subhashini_2019,
author = {M. Subhashini, P. Srivaramangai},
title = {Data Protection Using Elliptic Curve Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {02},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {134-138},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=662},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=662
TI - Data Protection Using Elliptic Curve Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - M. Subhashini, P. Srivaramangai
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 134-138
IS - 02
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud computing is a network-based service that provide sharing of resources such as virtual machine, storage, network, software and applications etc. It helps to reduce capital costs since that cloud users only need to rent resources according to their requirements and pay the services they use. It is very flexible since users can access its service in any place through intranet. However, a variety of security concerns such as integrity, availability and privacy act as barriers for cloud users to adopt the cloud service. Among all of these concerns, security of data is key concern holding back cloud adoption for individual or companies. The main purpose of this paper will introduce a method to protect data by using Elliptic Curve cryptography algorithm, how this algorithm works, and using ECC in data security of cloud computing.

Key-Words / Index Term

Cloud Computing, Security, Algorithm, Elliptic Curve, Challenges, Encryption, Decryption

References

[1]. L. Kleinrock, “A Vision for the Internet”, ST Journal of Research, 2(1):4-5, Nov, 2005.
[2]. Mell, Peter, and Timothy Grance, "The NIST definition of cloud computing (draft)," NIST special publication vol.800, 2011.pp 145.
[3]. P. Siani. "Privacy, security and trust in cloud computing." Privacy and Security for Cloud Computing. Springer London, 2013. pp3-42.
[4]. H.Jian, Z. . “Analysis and Application of Consumer Features with Cloud Computing and Data Mining Technology.” In Intelligent Computation Technology and Automation, 7th International Conference ICICTA, Oct 2014 ,pp. 84-87.
[5]. B. Rajiv R and M.Nitin."Cloud Computing A CRM Service Based On Separateencryption And Decryption Using Blowfish Algorithm." computing, vol.1, pp. 11.
[6]. Aye Aye Thu, “Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment”,International Journal of Computer Applications,Vol. 67– No.4, 2013.
[7]. VinayakShukla,ShobhitSrivastava, Nidheesh Sharma, “Cloud Computing: Security Issues and Solutions”,International Journal of Emerging Trends & Technology in Computer Science,Vol.3, Issue 5, 2014. [10]Mitchell Cochran,Paul D. Witman, “Governance And Service Level Agreement Issues In A Cloud Computing Environment”,Journal of Information Technology Management, Vol. XXII, Number 2, 2011.
[8]. Grispos, G., Glisson, W.B., and Storer, T., “Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization”, 21st European Conference on Information Systems, 5-8, 2013.
[9]. BijayalaxmiPurohit,PawanPrakash Singh, “Data leakage analysis on cloud computing”,International Journal of Engineering Research and Applications,Vol. 3, Issue 3, 2013.
[10]. V. Shobana, M. Shanmugasundaram, “Data Leakage Detection Using Cloud Computing”,International Journal of Emerging Technology and Advanced Engineering, Vol.3, Special Issue 1, 2013.
[11]. Manas M N, Nagalakshmi C K, Shobha G, “Cloud Computing Security Issues And Methods to Overcome”,International Journal of Advanced Research in Computer and Communication Engineering,Vol. 3, Issue 4, 2014.
[12]. Tomoyoshi Takebayashi, Hiroshi Tsuda, TakayukiHasebe, RyusukeMasuoka, “Data Loss Prevention Technologies”, FUJITSU Sci. Tech, vol.46, No.1, PP 47-55, 2010.
[13]. Certicom, Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Version 1.0, September 2000, Available at http://www.secg.org/download/aid-385/sec1_final.pdf
[14]. Certicom, Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0, September 2000, Available at http://www.secg.org/download/aid-386/sec2_final.pdf
[15]. Darrel Hankerson, Alfred Menezes and Scott Vanstone, Guide to Elliptic Curve Cryptography, Springer (2004).
[16]. Lawrence C. Washington, Elliptic Curves Number Theory and Cryptography, Taylor & Francis Group, Second Edition (2008).
[17]. Jorko Teeriaho, Cyclic Group Cryptography with Elliptic Curves, Brasov, May (2011).
[18]. S.Maria Celestin Vigila and K. Muneeswaran, Implementation of Text based Cryptosystem using Elliptic Curve Cryptography, International Conference on Advanced Computing, IEEE, pp. 82–85, December (2009).
[19]. D. Sravana Kumar, Ch. Suneetha and A. Chandrasekhar, Encryption of Data Using Elliptic Curve Over Finite Fields, International Journal of Distributed and Parallel Systems (IJDPS), vol. 3, no. 1, January (2012).