Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

ENHANCED SECURITY USING ELLIPTIC CURVE

CRYPTOGRAPHY IN CLOUD

DEPARTMENT OF INFORMATION TECHNOLOGY

Batch-13

Review-01

Under the Esteemed Guidance Of


Ms.B.Sai Deepthi, M.Tech,
Assistant professor

Team Members

P.P.S.V.V.YASHWANTH SIVA KUMAR - 21T95A1206


K.VIJAY KUMAR - 20T91A1211
N.RAMESH - 21T95A1205
M.JEEVAN - 20T91A1222

GIET ENGINEERING COLLEGE


Accredited by NAAC A+, Affiliated to JNTUK, Kakinada, Chaitanya Knowledge City,
Velugubanada, Rajamahendravaram-533296, Andhra Pradesh, India

2023-2024
CONTENTS
 ABSTRACT

 INTRODUCTION

 EXISTING SYSTEM

 LIMITATIONS

 PROPOSED SYSTEM

 ADVANTAGES

 REQUIREMENTS

 CONCLUSION
ABSTRACT

Cloud Computing is storing and accessing data and programs over the Internet
instead of personal computers. Its flexibility, cost- effectiveness, and dynamically re-
allocation of resources as per demand make it desirable. As desirable as it is, it has also
created security challenges such as information leakage, account hijacking and denial of
service. The proposed work is to develop a Software as a Service application to prevent
information leakage by providing multifactor authentication, risk assessment, encryption
using enhanced elliptic curve cryptography where a cryptographically secure random
number generation is used to make the number unpredictable, data integrity, key
management and secure disposal of information.
INTRODUCTION

The project " Enhanced Security Using Elliptic Curve Cryptography in Cloud "
aims to enhance the security of cloud computing environments by leveraging the power of
ECC. This documentation provides a comprehensive review of the project's objectives, the
significance of ECC in cloud security, and the key aspects covered in this document. The
insights gained from this research will contribute to strengthening the security posture of
cloud-based systems and fostering secure data communication in the cloud. Cloud
Computing is storing and accessing data and programs over the Internet instead of personal
computers. It is a computing paradigm shift where computing is moved away from
personal computers or an individual server to a cloud of computers. Its flexibility, cost
effectiveness, and dynamically re-allocation of resources as per demand make it desirable.
As desirable as it is, it has also created security challenges such as information leakage,
account hijacking and denial of service.
EXIXTING SYSTEM

The existing system for security in cloud computing relies on the widely adopted
Advanced Encryption Standard (AES) algorithm. AES has been extensively used and
proven to provide strong encryption for securing data in the cloud. However, the AES-
based system does have certain disadvantages that need to be addressed. These include
larger key sizes, increased computational overhead, potential scalability limitations, and
vulnerability to future quantum computing threats. Through the utilization of ECC, we
seek to achieve stronger data protection, faster cryptographic operations, efficient resource
utilization.

LIMITATIONS
 Key Size
 Computational Overhead
 Key Distribution and Management
 Lack of Forward Secrecy
 Deterministic Encryption
 Side-Channel Attacks
PROPOSED SYSTEM

All existing algorithms require large size of keys generation and management which
took heavy computation time and resources which may increase cloud usage cost and to
overcome from this problem ECC (elliptic curve cryptography) algorithm is introduce
which is lighter to generate keys and take less computation time and resources to encrypt
or decrypt data. The Cloud Computing systems that provide services to the Internet users
apply the public key and private or traditional identity based cryptography that has some
identity elements that fit well in the requirement of cloud computing. This work aims at
improving cloud computing within Cloud Organizations with encryption awareness based
on Elliptic Curve Cryptography.

ADVANTAGES
 Strong Security with Shorter Keys.
 Faster Performance Bandwidth Efficiency
 Lower Storage Requirements Scalability
 Energy Efficiency
 Security in Resource-Constrained Devices
REQUIREMENTS

Software :
 Operating System : Windows 10 or 11,linux

 Platform : Visual Studio code Editor

 Languages : Python idle 3.7 version, Anaconda 3.7,


Jupyter NoteBookGoogle colab.

Hardware

 Processor : Minimum intel i3

 Ram : Minimum 4 gb

 Hard disk : Minimum 250gb


CONCLUSION

In conclusion, this project highlights the significance of Elliptic Curve Cryptography


(ECC) as a robust and resource-efficient encryption technique for enhancing data security
in cloud environments. Through a comprehensive comparison with the Conventional AES
algorithm, ECC demonstrates its ability to provide swift encryption and decryption while
minimizing computation costs. This project underscores ECC's potential to mitigate
security concerns associated with cloud storage, making it a valuable addition to the
arsenal of data protection methods, ensuring the confidentiality and integrity of sensitive
information in cloud-based applications.

You might also like