Implementation and management of cloud security for industry 4.O - data using hybrid elliptical curve cryptography

被引:2
作者
Krishnamoorthy N. [1 ]
Umarani S. [2 ]
机构
[1] Department of Computer Science, College of Science and Humanities, SRM Institute of Science And Technology, Ramapuram, Tamil Nadu, Chennai
[2] Department of Computer Applicatiobs, College of Science and Humanities, SRM Institute of Science And Technology, Ramapuram, Tamil Nadu, Chennai
关键词
Advanced encryption standard; Cloud computing; Cyber security; Elliptic curve cryptography; Google apps; Industry; 4.0;
D O I
10.1016/j.hitech.2023.100474
中图分类号
学科分类号
摘要
Industry 4.0 places a premium on cloud security since more and more companies are moving their activities to the cloud to reap the benefits of the Fourth Industrial Revolution.The term “cloud computing” refers to a collection of Internet-based hardware and software tools. Providers of cloud services use data centers situated in various physical locations. Cloud computing makes life easier for users by making remote, simulated resources available over the internet. Google Apps and Microsoft SharePoint are two examples of popular cloud applications. In addition to its exciting potential, the “cloud computing” industry's lightning-fast expansion raises serious security concerns. When discussing security, cloud really suffers from Open Systems' and the internet's perennial problem. The only thing stopping the widespread use of cloud computing is the lack of trust in the system. There are a number of security concerns with cloud computing, including protecting user data and vetting cloud service providers' practices. Using encryption, confidential information can be sent over an unsecured channel without fear of data loss or manipulation. Data encryption using various protocols has been used in various settings. Different cryptosystems were developed and used at various times. Additionally, cloud computing enables multiple users to access and retrieve data simultaneously through their own personal Internet connections, which increases the risk of confidential data loss and exposure in a number of different places. Elliptic Curve Cryptography and other cryptographic algorithms have been used to develop numerous methods and protocols that guarantee the security and privacy of transmitted data. In this paper, we suggest a safe and efficient method for sharing information in the cloud without compromising its safety or integrity. The proposed system is able to guarantee authentication and data integrity because it uses a hybrid of the ECC and the Advanced Encryption Standard (AES) technique. The experimental results confirm the proposed approach outperforms the current gold standard. © 2023 Elsevier Inc.
引用
收藏
相关论文
共 28 条
  • [21] Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach
    Kumar, Pawan
    Kumar Bhatt, Ashutosh
    IET COMMUNICATIONS, 2020, 14 (18) : 3212 - 3222
  • [22] Scalable Anomaly Detection for Large-Scale Heterogeneous Data in Cloud Using Optimal Elliptic Curve Cryptography and Gaussian Kernel Fuzzy C-Means Clustering
    Kumar, P. Santhosh
    Parthiban, Latha
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2020, 29 (05)
  • [23] Hybrid Cryptosystem for Image Security by Using Hill Cipher 4x4 and ElGamal Elliptic Curve Algorithm
    Rachmawati, Dian
    Budiman, Mohammad Andri
    Wardhono, Muhammad Ishan
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2018, : 49 - 54
  • [24] Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data
    Gai, Keke
    Qiu, Meikang
    Elnagdy, Sam Adam
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 197 - 202
  • [25] A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud
    Maddila, Suresh Kumar
    Vadlamani, Nagalakshmi
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2023, 22 (06)
  • [26] Elliptic Curve Cryptography Implementation on FPGA using Montgomery Multiplication for Equal Key and Data size over GF(2m) for Wireless Sensor Networks
    Leelavathi, G.
    Shaila, K.
    Venugopal, K. R.
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 468 - 471
  • [27] M-SMDM: A model of security measures using Green Internet of Things with Cloud Integrated Data Management for Smart Cities
    Rehman, Amjad
    Haseeb, Khalid
    Saba, Tanzila
    Kolivand, Hoshang
    ENVIRONMENTAL TECHNOLOGY & INNOVATION, 2021, 24
  • [28] A Study on vehicle to vehicle collision prevention using Fog, Cloud, big data and Elliptic curve security based on threshold energy efficient protocol in wireless sensor network
    Sathishkumar, N.
    Rajakumar, K.
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 275 - 280