Revolutionizing Cloud Data Security with Elliptic Curve Cryptography

Authors

  • V. Jainendra MCA Student, Department of Master of Computer Applications, KMM IPS /Tirupathi, Chittoor(D.t), Andhra Pradesh, India Author
  • C. Yamini Assistant Professor, Department of Master of Computer Applications, KMM IPS /Tirupathi, Chittoor(D.t), Andhra Pradesh, India Author

Keywords:

Elliptic Curve Cryptosystem (ECC), Cloud Computing, Data security

Abstract

Encryption helps in transmitting sensitive data over an insecure channel without any danger of data being lost or being manipulated by some unauthorized entity. Different Encryption schemes have been applied for Data security in a different environment. Many cryptosystems worked during different eras and evolved accordingly with time. This paper mainly focuses on asymmetric encryption which is also known as Public key encryption scheme or Homomorphic encryption. However, due to large key size asymmetric encryption is mostly used for Key exchange rather than data Encryption. Nowadays, Data security is the main issue in large data centres and Cloud computing. This paper uses Elliptic Curve Cryptography to encrypt data in the cloud environment because the size of the key used in Elliptic Curve Cryptography is very small. Due to the small key size of Elliptic Curve, computational power is reduced and this results into least energy consumption. This paper shows that elliptic curve cryptography is fast and more efficient for data protection in a cloud computing environment and reduces the computational power and also increases the efficiency.

Downloads

Download data is not yet available.

References

R. Lu, X. Yuan, and X. Lin, "Homomorphic Encryption for Cloud Computing: An Overview," IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2381-2405, 2021.

J. Shen, J. Niu, J. Cao, and Y. Mei, "A Survey on Cloud Security Issues and Techniques: Cryptographic and Non-Cryptographic Approaches," IEEE Transactions on Services Computing, vol. 13, no. 3, pp. 434-451, 2020.

X. Kong, J. Wang, and Q. Ni, "Efficient Data Security and Privacy-Preserving Scheme in Cloud Computing," IEEE Access, vol. 10, pp. 24356-24367, 2022.

M. S. Ali, K. K. R. Choo, and S. H. Ahmed, "Blockchain-Based Secure Data Storage and Access Control for Cloud Applications," IEEE Transactions on Cloud Computing, vol. 9, no. 3, pp. 1215-1226, 2021.

V. S. Pendyala, S. M. Arafath, and S. R. Kulkarni, "Elliptic Curve Cryptography for Real-Time Data Encryption in IoT and Cloud Computing," IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3615-3623, 2021.

K. Khan and R. Qazi, "Data Security in Cloud Computing Using Elliptic Curve Cryptography," International Journal of Computing and Communication Networks, vol. 1, no. 1, pp. 46-52, 2019

V. S. Miller, "Use of Elliptic Curves in Cryptography," in Conference on the Theory and Application of Cryptographic Techniques, 1985, pp. 417-426.

M. -Q. Hong, P. -Y. Wang, and W. -B. Zhao, "Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing," in IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart Computing (HPSC), and Intelligent Data and Security (IDS), 2016, pp. 152-157.

A. Chhabra and S. Arora, "An Elliptic Curve Cryptography Based Encryption Scheme for Securing the Cloud Against Eavesdropping Attacks," in IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), 2017, pp. 243-246.

T. Banerjee and M. A. Hasan, "Energy Efficiency Analysis of Elliptic Curve Based Cryptosystems," in 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom/BigDataSE), 2018, pp. 1579-1583.

Downloads

Published

05-05-2025

Issue

Section

Research Articles