Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds

Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds

Anju Malik, Mayank Aggarwal, Bharti Sharma, Akansha Singh, Krishna Kant Singh
Copyright: © 2020 |Pages: 17
DOI: 10.4018/IJKSS.2020100105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the rapid development of cloud advancement, a data security challenge has emerged. In this paper, a technique based on elliptical cryptography and cuckoo search algorithm is proposed. With this technique, data owners securely store their data files in the cloud server. Initially the user sends a file storage request to store a file in a cloud server provider (CSP). The input file is checked whether it is sensitive or non-sensitive by the user. If the file is sensitive, then it would be split and stored in different virtual machines (VMs), and if the file is non-sensitive, then it would be assigned in a single VM. This approach was used for the first time as per the survey. To add further security, the sensitive data retrieval needs an encryption process that is supported by the proposed algorithm. If the data owner stores the sensitive data to cloud server, the data owner's document is encrypted by the double encryption technique. Here RSA and optimal elliptic curve cryptography (OECC) algorithm is used to encrypt the document with high security. The authors have used cuckoo search algorithm to identify the optimal key in ECC. This paper has proposed a novel cryptography approach for delivering mass distributed storage by which user's original data cannot be directly reached by cloud operators. Hence, this research has proved that the proposed work will give better securable data storage solving the security issues.
Article Preview
Top

1. Introduction

Cloud computing technology is used in commercial phase development. There are numerous cloud providers available to supply cloud services from IaaS to SaaS. In that case, users can access any type of services for dissimilar intention (Giuseppe et al., 2015). Initially, cloud computing was used as a hotspot in cooperation of trade and college circles. It was indicated as an innovative business representation and computing model, which facilitate on require provisioning of computational and storage possessions (Xiao et al., 2013). Cloud computing offered by a commercial function, empowering trade through distributing software and services above the Internet to a huge consumer support (Zahir et al., 2015). Data is a fundamental positive feature for business. Data could be in several structures, i.e. numbers, words, images etc. Data isolation and protection is a fundamental difficulty for business. Data contains a variety of possessions such as exactness, legitimacy, consistency (Rizwana et al., 2015). Cloud computing technology is used in commercial phase development.

The advantages of clouds serviceable and profitable are extensive. The noteworthy difficulty for facilitating consumer expectation in cloud computing is safety declaration and simplicity (Jesus et al., 2015). Cloud computing technologies are used to changing our world, but several persons utilize these services devoid of any knowledge. For example, he or she is employing a cloud by each time somebody carry out a Google search, place a comment on a desired social networking site, or utilize a cell phone (AzuaHimmel et al., 2014). In Cloud Computing, there are numerous occasions that allow data accumulated to be momentarily at desktop computers, mobile phones or further internet devices. The software industries or individuals are accumulate their data in the cloud in stretchy mode, which contains a few remuneration like evading of principal costs on individual maintenances, hardware, software, break of online trouble of data storage (Bhubaneswar et al.,2015). Cloud computing defense or, cloud safety is a growing sub-field of computer protection, network protection, and also information protection. It expressed by an extensive group of policies, technologies, and controls installed to defend data, function, and the related infrastructure of cloud computing (Passentet al., 2015). The existing study confront in cloud services is the protected and isolation defending verification of consumer. Consumers contain a significant right of isolation that they store their susceptible information like economic information, health records, etc (Wanga et al., 2015).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing