18-08-2014, 12:08 PM
Efficient Elliptic-Curve Cryptography Encryption Framework for
Cloud Computing
Efficient Elliptic.docx (Size: 1.37 MB / Downloads: 10)
Abstract
Cloud computing has benefited significantly from ever-increasing computer hardware capabilities, including high-speed micro processing, large memory capacity, and increased network bandwidth with high storage, which is a development trend that is expected to continue. Cloud computing enables the addition of colored displays to full-blown Web browsers. Some processes use embedded cloud warnings to investigate data storage in a local or intermediary system. For instance, all log files in a cloud-computing server either upload or download data, and all of the sessions are stored in clear, unencrypted text on a local computer that is accessible by multiple users. The cloud client encrypts sessions using the standard method; however, the server does not fully protect such sessions. A scheme involving low-cost encryption and an elliptic curve is established in this study to solve this issue, and a lookup table is integrated into the proposed framework.
Introduction
Digital storage devices have become smaller in the last three decades. For instance, the size of the floppy disk has decreased from 8 in to5¼ in and then to 3½ in(Flamm 2013). The information technology sector has also established an efficient long-distance storage solution, which has spread dramatically since the mid-nineties. This type of storage is known as the Web host sharing service(Ye et al. 2013) and allows a user to access stored information from anywhere, Cloud researchers have developed several types of clouds, such as private, community, and public clouds, through cloud computing (Xu 2012).
The amount of data uploaded continues to increase as cloud development progresses, thus resulting in the establishment of free cloud services, such as Google, Yahoo, and Windows Outlook. Some private companies, such as Sales (force.com), also offer these services (Davis 2013).
Over90% of users feel that security is insufficient although cloud computing provides security, confidentiality, and information privacy. Some users attempt to hide their data from the public by availing of cloud services; other users report the lack of security experienced even though they use a secure hypertext translate protocol. These users believe that certificate exchanges between the client(s) and the user compromise security. The security challenge is serious at present, and integrating RSA with security certificates may improve security. However, the online information of advanced users, such as online enterprise companies, E-commerce industries, E-governments, and campuses, provides an interesting challenge to hackers, who can easily identify weak security. Hackers forge information and attempt to deconstruct cryptographic algorithms using hacking tools, such as brute force attack, to crack RSA encryption/decryption(Nafi et al. 2013). Therefore, an efficient, low-cost, encryption framework based on lookup tables (LUTs) is established between the client and the cloud server through elliptic-curve cryptography (ECC) in this project.
Conclusions
The findings of this study revealed that crypto-algorithm duplication is not compulsory. Establishing a single algorithm through cost-efficient enhancement is a feasible idea because it maintains the smooth operation of the authentication process through an elliptic curve