An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2

Abstract

"Cloud Computing with Elliptic Curve Cryptography (ECC) is an entirely novel area and has inconceivable scope of research. It is a talented saleable infrastructure archetype that promises to exterminate require for maintaining exclusive computing amenities by companies and institutes comparable. It has obsessed insubstantial, technical, economic, and client experience characteristics. All through the use of virtualization and resource time allocation, clouds provide with a testing position of physical resources a gargantuan client base with dissimilar requirements. However, a user uses public network for the duration of right of entry of cloud services at the same time an adversary knows how to get full control over the public network. Therefore, a user ought to advocate a mechanism in which user and server can authenticate each other and generate a safe session. In this projected protocol, user and server established a session key and can communicate securely through the public network. This recently protocol decreases the cost of computation deeply and compared with previous existing protocol. Detailed network security investigations have been made to authenticate the proficiency of the protocol. Additional, this protocol has the argument to likely attacks in cloud computing. "

Authors and Affiliations

Keywords

Related Articles

Survey on MapReduce and Scheduling Algorithms in Hadoop

we are living in the data world. It is not easy to measure the total volume of data stored electronically. They are in the unit of zettabytes or exabytes referred as Big Data. It can be unstructured, structured or semi s...

Strength and Durability Characteristics of Fibre Reinforced Concrete

Invention of new methods in strengthening concrete is under work for decades. On the track of such invention Fiber Reinforced Composite materials plays a significant role. The main function of fiber reinforcement is to c...

Comparison of Outcome of Passive Joint Mobilization Techniques with Active Assisted Pulley Exercises in Patients with Frozen Shoulder in Improving Range of Motion

Frozen shoulder is a multi-factorial glenohumeral joint dysfunction that develops due to many causes and it involves a large number of world populations irrespective of gender and race. Its prevalence is 2 to 5 percent o...

A Comparison of Lion Home Range Sizes in Two Management Blocks in a Semi-Arid Savannah National Park of Zimbabwe

A Comparison of Lion Home Range Sizes in Two Management Blocks in a Semi-Arid Savannah National Park of Zimbabwe

Implementation of Wireless Sensor Network for Real Time Monitoring of Agricultural Parameter

Present paper objective is to develop a smart wireless sensor network (WSN) for an agricultural environment. Monitoring agricultural environment for various factors such as soil moisture, temperature and humidity along w...

Download PDF file
  • EP ID EP355012
  • DOI -
  • Views 78
  • Downloads 0

How To Cite

(2015). An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing. International Journal of Science and Research (IJSR), 4(2), -. https://europub.co.uk./articles/-A-355012