A Data Security Algorithm for the Cloud Computing based on Elliptic Curve Functions and Sha3 Signature

被引:0
作者
Kotel, Sonia [1 ]
Sbiaa, Fatma [2 ]
机构
[1] Univ Sousse, ISITCom Hammam Sousse, Sousse, Tunisia
[2] Univ Monastir, Fac Sci Monastir, Monastir, Tunisia
关键词
Cloud; IaaS simulation upon SimGrid (SCHIaas); elliptic curve encryption; one-time pad symmetrical encryption method (OTP); confidentiality; integrity; KEY EXCHANGE PROTOCOL; STORAGE; PRIVACY; ISSUES;
D O I
10.14569/IJACSA.2022.0130355
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rapid development of distributed system technologies enforces numerous challenges. For example, one of the most critical challenges facing cloud computing is ensuring the security of confidential data during both transfer and storage. Indeed, many techniques are used to enhance data security on cloud computing storage environment. Nevertheless, the most significant method for data protection is encryption. Thus, it has become an interesting topic of research and different encryption algorithms have been put forward in the last few years in order to provide data security, integrity, and authorized access. However, they still have some limitations. In this paper, we will study the security concept in Cloud Computing applications. Then, an ECC (Elliptical Curve Cryptography) based algorithm is designed and tested to ensure cloud security. The experimental results demonstrate the efficiency of the proposed algorithm which presents a strong security level and reduced execution time compared to widely used existing techniques.
引用
收藏
页码:458 / 465
页数:8
相关论文
共 25 条
  • [1] Evaluating Security and Privacy in Cloud Services
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Shiva, Sajjan
    Sheldon, Frederick T.
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 683 - 686
  • [2] Aldossary S, 2016, INT J ADV COMPUT SC, V7, P485
  • [3] Alharbi A, 2020, INT J ADV COMPUT SC, V11, P618
  • [4] A survey on data security issues in cloud computing: From single to multi-clouds
    Alzain, Mohammed A.
    Soh, Ben
    Pardede, Eric
    [J]. Journal of Software, 2013, 8 (05) : 1068 - 1078
  • [5] Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud
    Amalarethinam, D. I. George
    Leena, H. M.
    [J]. 2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 172 - 175
  • [6] Notes on "Secure authentication scheme for IoT and cloud servers"
    Chang, Chin-Chen
    Wu, Hsiao-Ling
    Sun, Chin-Yu
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 38 : 275 - 278
  • [7] Chow Sherman S. M., 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P526, DOI 10.1007/978-3-642-31284-7_31
  • [8] Duncan A. J., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P857, DOI 10.1109/TrustCom.2012.188
  • [9] A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 69 (01) : 395 - 411
  • [10] Security as a Service in Smart Clouds - Opportunities and Concerns
    Getov, Vladimir
    [J]. 2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 373 - 379