An Elliptic Curve Cryptography based Encryption Scheme for Securing the Cloud against Eavesdropping Attacks

被引:23
|
作者
Chhabra, Anshuman [1 ]
Arora, Shivam [2 ]
机构
[1] Univ Delhi, Netaji Subhas Inst Technol, Div Elect & Commun Engn, New Delhi, India
[2] Guru Gobind Singh Indraprastha Univ, Dept Comp Sci, New Delhi, India
关键词
Cloud security; Cryptography; Elliptic Curve Cryptography; Cloud storage; Encryption; RSA;
D O I
10.1109/CIC.2017.00040
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has recently become an extremely useful facet of modern distributed systems. Some of its many applications lie in the development of web services, its federation with the Internet of Things (IoT) and services for users in the form of storage, computing and networking facilities. However, as more services start utilizing the Cloud as a viable option, security concerns regarding user data and privacy also need to be tackled. In this paper, a security scheme for preventing eavesdropping attacks in Cloud environments is proposed. The encryption scheme is based on Elliptic Curve Cryptography and is specifically tailored for securing Cloud services providing storage facilities. As it is based on Elliptic Curve Cryptography, subsequent results obtained show that it reduces the computational overhead incurred in the encryption of data. The performances of other traditional security schemes such as RSA are also compared with the proposed encryption scheme. It is observed that the proposed scheme outperforms the other schemes in terms of the chosen performance characteristics.
引用
收藏
页码:243 / 246
页数:4
相关论文
共 50 条
  • [1] Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
    Hong, Ming-quan
    Zhao, Wen-bo
    Wang, Peng-yu
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 152 - 157
  • [2] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    [J]. International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [3] Securing CoAP Through Payload Encryption: Using Elliptic Curve Cryptography
    Harish, M.
    Karthick, R.
    Rajan, R. Mohan
    Vetriselvi, V.
    [J]. ICCCE 2018, 2019, 500 : 497 - 511
  • [4] A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography
    Liang, Haotian
    Zhang, Guidong
    Hou, Wenjin
    Huang, Pinyi
    Liu, Bo
    Li, Shouliang
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (12):
  • [5] An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography
    Benssalah, Mustapha
    Rhaskali, Yesser
    Drouiche, Karim
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 2081 - 2107
  • [6] An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography
    Mustapha Benssalah
    Yesser Rhaskali
    Karim Drouiche
    [J]. Multimedia Tools and Applications, 2021, 80 : 2081 - 2107
  • [7] Cryptography in the cloud: securing cloud data with encryption
    Mani, A.
    Kakade, Kiran Shrimant
    Therasa, P. R.
    Vanitha, M.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 577 - 589
  • [8] Encryption Scheme Based on Hyperelliptic Curve Cryptography
    John, Asha Liza
    Thampi, Sabu M.
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 491 - 506
  • [9] An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography
    Bhuarya, Pallavi
    Chandrakar, Preeti
    Ali, Rifaqat
    Sharaff, Aakanksha
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)
  • [10] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (12): : 6428 - 6453