Abstract
The technological advancements in the field of the information and communication technology led to the development of more promising cloud paradigm that allows online provision of services such as platform, software and infrastructure. The infrastructure services provided by the cloud allows the user data to be stored and accessed ubiquitously unlike the arrays that are available on the premises. However the security of the data that are being stored in the internet are still under research. This remains as major inhibitor for the adoption of cloud service in spite of its reliability, elasticity, high computational capabilities and the pay as you go possibilities. So the paper puts forth the construction of a secure storage as service in the cloud computing by utilizing the cryptography system based on Elgamal. The proposed method encrypts the data to be stored using the Elgamal that incorporates the hyper elliptic curve cryptography for twofold encryption and further utilizes the fuzzy logic to perform the integer selection that serves as the significant attribute in defining the cloud storage security. The point addition and the double based ECC is used for generating the keys for the hyper elliptic curve cryptography. The twofold security model put forth is validated using the MATLAB on the terms of efficiency observed on securing the data stored in cloud as well as the cost and the execution time endured by the proposed twofold security. The results shows that the protection offered by the twofold security is much better compared to the prevailing.
References
- Jaber, Aws Naser, and Mohamad Fadli Bin Zolkipli. "Use of cryptography in cloud computing." In 2013 IEEE International conference on control system, computing and Engineering, pp. 179-184. IEEE, 2013.
- Li, Hongwei, Yuanshun Dai, and Bo Yang. "Identity-Based Cryptography for Cloud Security." IACR Cryptology ePrint Archive 2011 (2011): 169.
- Mugunthan, S. R. "Security and Privacy Preserving Of Sensor Data Localization Based On Internet Of Things." Journal of ISMAC 1, no. 02 (2019): 81-91.
- Rahmani, Hossein, Elankovan Sundararajan, Zulkarnain Md Ali, and Abdullah Mohd Zin. "Encryption as a Service (EaaS) as a Solution for Cryptography in Cloud." Procedia Technology 11, no. 2013 (2013): 1202-1210.
- Bhalaji, N. "Efficient And Secure Data Utilization In Mobile Edge Computing By Data Replication." Journal of ISMAC 2, no. 01 (2020): 1-12.
- Tobin, Paul, Lee Tobin, Michael Mc Keever, and J. Blackledge. "Chaos-based cryptography for cloud computing." In 2016 27th Irish Signals and Systems Conference (ISSC), pp. 1-6. IEEE, 2016.
- Suma, V. "Security and Privacy Mechanism Using Blockchain." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 45-54.
- Belej, Olexander. "The cryptography of elliptical curves application for formation of the electronic digital signature." In International Conference on Computer Science, Engineering and Education Applications, pp. 43-57. Springer, Cham, 2019.
- Smys, S. "Ddos Attack Detection In Telecommunication Network Using Machine Learning." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 33-44.
- Prabu, M., and R. Shanmugalakshmi. "Fault Analysis Attacks and Its Countermeasure using Elliptic Curve Cryptography." International Journal of Computer Science & Information Security (2010).
- Haoxiang, Wang. "Trust Management Of Communication Architectures Of Internet Of Things." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 02 (2019): 121-130.
- Barkha, Prajapati. "Implementation of DNA cryptography in cloud computing and using socket programming." In 2016 International Conference on Computer Communication and Informatics (ICCCI), pp. 1-6. IEEE, 2016.
- Shakya, Subarna. "An Efficient Security Framework For Data Migration In A Cloud Computing Environment." Journal of Artificial Intelligence 1, no. 01 (2019): 45-53.
- Shahzadi, Shumaila, Bushra Khaliq, Muhammad Rizwan, and Fahad Ahmad. "Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System." Security and Communication Networks 2020 (2020).
- Mugunthan, S. R. "Soft Computing Based Autonomous Low Rate DDOS Attack Detection And Security For Cloud Computing." Journal of Soft Computing Paradigm (JSCP) 1, no. 02 (2019): 80-90.
- Shanmugapriya, E., and R. Kavitha. "Medical big data analysis: preserving security and privacy with hybrid cloud technology." Soft Computing 23, no. 8 (2019): 2585-2596.
- Ramakrishnan, S. Cryptographic and Information Security Approaches for Images and Videos. CRC Press, 2018.
- Mosola, Napo Nathnael. "Client-side encryption and key management: enforcing data confidentiality in the cloud." PhD diss., 2016.
