Abstract
Ensuring the security and efficient authentication of any information is a prime concern for a cryptographic technique. In cloud model, since data is outsourced over untrusted third party without any physical possession of that, increase the concern regarding the cloud data security. Public key cryptography technique in cloud system is useful only if there is proper authentication of transformation of public key to authenticated user only. On the other hand, ECC technique compared to this provides different ways of ECC cryptographic key management, encryption, decryption, and digital signature and its verification. The advantage of ECC over public key scheme is that, it provides the same security level for a smaller key size compared to public key scheme, thus, reducing the process time of any cryptographic operation over the data in its communication between different cloud communicating parties. In this paper, we present a new framework for cloud system which has a different way of encryption/ decryption using ECC over finite field and improve signature and verification scheme. The result shows that communication cost is less compared to other scheme and improved speedup for signature and verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol. IT-22, (1976), pp. 644–654.
R. Rivest, A. Shamir and L. Adeleman, A method for obtaining digital signatures and public key cryptosystems, Communication of the ACM, Vol. no 21, (1978), pp. 120–126.
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transaction on Information Theory, IT-31(4), 1985, pp. 469–472.
N. Koblizt, Elliptic curve cryptosystem, Mathematics of Computation 48(177), 1987, pp. 203–209.
V. S. Miller, Use of elliptic curves in cryptography, Advances in Cryptology-Proceedings of Crypto’85, LNCS, vol. 218, Springer, 1986, pp. 417–426.
Mell, Peter, and Tim Grance. “The NIST definition of cloud computing.” (2011).
Shahril, Eddie, and Wan Daud Wan Suhana. “ID-Based signature scheme using elliptic curve cryptosystem.” (2013).
Y. F. Chung, K. H. Huang, F. Lai, T. S. Chen, ID-based digital signature scheme on the elliptic curve cryptosystem, Computer Standards and Interfaces 29, 2007, pp. 601–604.
Abid, Ounasser, Jaouad Ettanfouhi, and Omar Khadir. “New digital signature protocol based on elliptic curves.” arXiv preprint arXiv:1301.2335 (2013).
N. Koblizt, A. Menezes, S. Vanstone, The state of elliptic curve cryptography, Design, Codes and Cryptography 19, 2000, pp. 173–193.
Ch. Suneetha, D. Sravana Kumar and A. Chandrasekhar, “Secure key transport in symmetric cryptographic protocols using elliptic curves over finite fields”, International Journal of Computer Applications, Vol. 36, No. 1 November 2011.
Kin Choong Yow and Amol Dabholkar, A Light-Weight mutual authentication and key-exchange protocol based of elliptical curve cryptography for energy-constrained devices, International Journal of Network Security & its Applications Vol. 2 No. 2 April 2010.
Mohsen Machhout eat.al., coupled FPGA/ASIC implementation of elliptic curve crypto-processor, International Journal of Network Security & its Applications Vol. 2 No. 2 April 2010.
K. R. Chandrasekhara Pillai and M P Sebastian, “Elliptic Curve based authenticated session Key establishment protocol for High Security Applications in Constrained Network environment” International Journal of Network Security & its Applications (IJNSA), Vol. 2, No. 3, July 2010.
Kumar, D. Sravana, C. H. Suneetha, and A. Chandrasekhar. “Encryption of data using Elliptic Curve over finite fields.” arXiv preprint arXiv:1202.1895 (2012).
Zhao, Gansen, et al. “Trusted data sharing over untrusted cloud storage providers.” Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on. IEEE, 2010.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Kaushik, S., Gandhi, C. (2016). An Improved Encryption and Signature Verification ECC Scheme for Cloud Computing. In: Lobiyal, D., Mohapatra, D., Nagar, A., Sahoo, M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 396. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3589-7_5
Download citation
DOI: https://doi.org/10.1007/978-81-322-3589-7_5
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-3587-3
Online ISBN: 978-81-322-3589-7
eBook Packages: EngineeringEngineering (R0)