Enhanced data security model for cloud using ECC algorithm and third party auditor
نویسندگان
چکیده
With the invention of cloud, the days of keeping all the documents on the computer’s hardware are gradually coming to an end. Today, people outsource their data at Cloud Service Provider (CSP)[1] who offers huge storage space at low cost. But as the data goes on cloud the user loses his control over the data and seeks for data security. Hence an efficient and effective method is needed to ensure integrity and confidentiality of outsourced data on un-trusted cloud servers. To address this issue the paper proposes Elliptic Curve Cryptography that owes a strong mathematical structure that raises the confidentiality level to an exceptionally high standard using minimum resources as compared to other existing algorithms like RSA, DES, AES etc., making it a first choice for devices with limited computing ability. Also paper proposes a method that allows Third Party Auditor to periodically verify the integrity of data stored at CSP without retrieving original data using md5 algorithm. The paper discusses key generation process, encryption and decryption of textual files using ECC algorithm along with a verification model which will address two crucial aspects of cloud security i.e. confidentiality and integrity. KeywordsElliptic curve cryptography algorithm (ECC), Cloud Service Provider (CSP),Data confidentiality and integrity, RSA algorithm, MD5 Hashing algorithm, Third Party Auditor (TPA).
منابع مشابه
Dynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage
Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing d...
متن کاملTo Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key manageme...
متن کاملCloud Data Security While using Third Party Auditor
In this paper the computing resources in the form of service rather than a utilities and product are provided to users over internet. The corporate world there are huge number of client which is accessing there data and modifying the data. The cloud is a platform where the data owner remotely stores their data in cloud. The goal of cloud computing concept is to secure and protect the data which...
متن کاملPreserving Privacy using Third Party Auditor in Cloud for Data Storage
Cloud computing is a internet based thing or next generation in information technology. Users store their large amount of data on a cloud server at the remote place without worrying about storage correctness and integrity of data. Security is viewed as one of the top positioned open issues in cloud computing. In most of the before proposed schemes, RSA algorithm was used for storage security. A...
متن کاملReview on Public Auditing for Cloud Storage using Third Party Auditors
Cloud computing is recent blooming technology which provides various services like storage, platform, applications etc. through internet. In cloud computing, data owner hosts (stores) their data on cloud servers and data users access those data through cloud servers any time and from any place. This leads to data outsourcing on cloud in high amount. But because of vast amount of data on cloud, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016