Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. With a promising technology like this, it certainly abdicates users’ privacy, putting new security threats towards the certitude of data in cloud. The security threats such as maintenance of data integrity, data hiding and data safety dominate our concerns when the issue of cloud security come up. In this research paper, we have contemplated a design for cloud architecture which ensures secured movement of data at client and server end. We have used the non breakability of Elliptic curve cryptography (ECC) with ones compliment for data encryption, proposed algorithm is based on 1’s complement subtraction to represent scalar in scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency. It has three security checkpoints: authentication, key generation and encryption of data.

Authors and Affiliations

Anusha K. P , Dr. Pritam Gajkumar Shah

Keywords

Related Articles

 An Improvement on Route Recovery by Using Triangular Fuzzy  Numbers on Route Errors in MANET

 Based on mobile nature in MANET, there is no doubt that all routing protocols have some route errors. Usually, routing protocols try to recover a route after a route error has been happened on an exact route &nbs...

Prototyping and Simulation of Robot Group Intelligence using Kohonen Networks

Abstract:Intelligent agents such as robots can form ad hoc networks and replace human being in many dangerous scenarios such as a complicated disaster relief site. This project prototypes and builds a computer simulator...

 Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

 ABSTRACT: In this article, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network we...

 Providing The Security Against The DDOS Attack In Mobile AdHoc Networks

 Abstract: The extensive applications of Mobile ad hoc networks are in civilian and military. In the MANETsnodes are joining to any point and leave the network at any point of time. This generic characteristic of MA...

 TAB-PRRA: Improved Link Repair Decision Mechanism for Ondemand Routing in MANET

 The traditional AODV protocol uses a fixed hop count based threshold as a basis for deciding when to invoke Local Repair or Source Repair in case of a link break. The problem arises with this type of repairing m...

Download PDF file
  • EP ID EP94342
  • DOI 10.9790/0661-1632107112
  • Views 141
  • Downloads 0

How To Cite

Anusha K. P, Dr. Pritam Gajkumar Shah (2014). Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 107-112. https://europub.co.uk./articles/-A-94342