Professional Documents
Culture Documents
Elliptic Curve Cryptography in Cloud Computing Security
Elliptic Curve Cryptography in Cloud Computing Security
Elliptic Curve Cryptography in Cloud Computing Security
First A.Santosh Kumar Singh, Research Scholar, Department of Computer Applications, Vinoba
Bhave University Hazaribag, India, Second B. Dr. P.K. Manjhi, Assistant Professor, University
Department of Mathematics, Vinoba Bhave University, Hazaribag, and Third C. Dr. R.K. Tiwari
India , Professor, H.O.D CSE, R.V.S College of Engg & Tech., Jamshedpur, India
ABSTRACT:
Cloud computing is a technological advancement that has been growing swiftly during the last decade. In
simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous
access to services through the Internet. It enables consumers to access applications and services that reside
on remote servers, without having to allocate large amounts of storage space on their own computer and
without the need for extensive compatibility configurations. Many such cloud applications provide services
that are meant to handle sensitive user data and thus the protection of this data in terms of access and
integrity is of major concern. Space- and time complexity of encryption algorithms can prove to be
imperative when it comes to system performance. In this paper we will briefly present how elliptic curve
cryptography (EEC)works, and how it can be used as an encryption solution to security related issues in
cloud computing.
Santosh Kumar Singh, Dr. P.K. Manjhi And Dr. R.K. Tiwari 179
ELLIPTIC CURVE CRYPTOGRAPHY IN CLOUD COMPUTING SECURITY
1. Software as a service: The consumer can use [5-9]It is an approach to public-key cryptography
applications running on the provider's cloud based on the algebraic structure of elliptic curves over
servers. The underlying cloud infrastructure finite fields. ECC requires smaller keys compared to
aspects of the service, such as network, non-ECC cryptography (based on plain Galois fields)
storage and operating systems, are not con- to provide equivalent security. Elliptic curves are
trolled by the consumer. A possible exception applicable for encryption, digital signatures, pseudo-
is user-specific application configuration random generators and other tasks. Its main
settings. Examples are: Dropbox and Google characteristics are as shown in Fig. 1. Stronger
Docs. encryption, efficient performance, highly scalable and
2. Platform as a service: The consumer can it is future of cryptography technology. They are also
create applications using programming used in several integer factorization algorithms that
languages, libraries and tools supported by have applications in cryptography, such as Lenstra
the provider and deploy these applications elliptic curve factorization. The primary benefit
onto the provider's cloud platform. As before,
Santosh Kumar Singh, Dr. P.K. Manjhi And Dr. R.K. Tiwari 180
International Journal of Computer Engineering and Applications,
Volume XII, Issue III, March 18, www.ijcea.com ISSN 2321-3469
promised by ECC is a smaller key size, reducing The Elliptic Curve Digital Signature
storage and transmission requirements, as shown in Algorithm (ECDSA) is based on the Digital
fig. 2, i.e. that an elliptic curve group could provide Signature Algorithm,
the same level of security afforded by an RSA-based The Edwards-curve Digital Signature
system with a large modulus and correspondingly Algorithm (EdDSA) is based on Schnorr
larger key: for example, a 256-bit ECC public key signature and uses twisted Edwards curves,
should provide comparable security to a 3072-bit RSA The ECMQV key agreement scheme is based
public key. on the MQV key agreement scheme,
The ECQV implicit certificate scheme.
Santosh Kumar Singh, Dr. P.K. Manjhi And Dr. R.K. Tiwari 182
International Journal of Computer Engineering and Applications,
Volume XII, Issue III, March 18, www.ijcea.com ISSN 2321-3469