Enhanced data security model for cloud using ECC algorithm and third party auditor

نویسندگان

  • Niyati Jain
  • Priya Jain
چکیده

With the invention of cloud, the days of keeping all the documents on the computer’s hardware are gradually coming to an end. Today, people outsource their data at Cloud Service Provider (CSP)[1] who offers huge storage space at low cost. But as the data goes on cloud the user loses his control over the data and seeks for data security. Hence an efficient and effective method is needed to ensure integrity and confidentiality of outsourced data on un-trusted cloud servers. To address this issue the paper proposes Elliptic Curve Cryptography that owes a strong mathematical structure that raises the confidentiality level to an exceptionally high standard using minimum resources as compared to other existing algorithms like RSA, DES, AES etc., making it a first choice for devices with limited computing ability. Also paper proposes a method that allows Third Party Auditor to periodically verify the integrity of data stored at CSP without retrieving original data using md5 algorithm. The paper discusses key generation process, encryption and decryption of textual files using ECC algorithm along with a verification model which will address two crucial aspects of cloud security i.e. confidentiality and integrity. KeywordsElliptic curve cryptography algorithm (ECC), Cloud Service Provider (CSP),Data confidentiality and integrity, RSA algorithm, MD5 Hashing algorithm, Third Party Auditor (TPA).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage

Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing d...

متن کامل

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key manageme...

متن کامل

Cloud Data Security While using Third Party Auditor

In this paper the computing resources in the form of service rather than a utilities and product are provided to users over internet. The corporate world there are huge number of client which is accessing there data and modifying the data. The cloud is a platform where the data owner remotely stores their data in cloud. The goal of cloud computing concept is to secure and protect the data which...

متن کامل

Preserving Privacy using Third Party Auditor in Cloud for Data Storage

Cloud computing is a internet based thing or next generation in information technology. Users store their large amount of data on a cloud server at the remote place without worrying about storage correctness and integrity of data. Security is viewed as one of the top positioned open issues in cloud computing. In most of the before proposed schemes, RSA algorithm was used for storage security. A...

متن کامل

Review on Public Auditing for Cloud Storage using Third Party Auditors

Cloud computing is recent blooming technology which provides various services like storage, platform, applications etc. through internet. In cloud computing, data owner hosts (stores) their data on cloud servers and data users access those data through cloud servers any time and from any place. This leads to data outsourcing on cloud in high amount. But because of vast amount of data on cloud, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016