SECURE HYBRID ENCRYPTION USING ECC IN CLOUDS

Danisha Shaik, C. Shoba Bindu, P. Dileep Kumar Reddy

Abstract


The evolution of the cloud computing furnishes a better way for the data storage. ABE with delegation is accustomed for accessing the data and keep it confidential. But this scheme faces some limitations like the cloud servers can replace the cipher text with some malignant intent. They may also cheat the eligible users as unauthorized ones. The cloud servers even face external threats like the security attacks. So, to protect against the security attacks and to preserve the data integrity in the cloud, a hybrid encryption with VD scheme is proposed by Xu et al. Even this scheme faces the challenges like having larger keys, more computational time and vulnerability to man-in-the-middle attacks. A secure Hybrid Encryption using ECC in clouds is proposed to overcome these problems. The application of Elliptic Curve Cryptography and its algorithms in the proposed work provides a greater security because of the Elliptic Curve Discrete Logarithm Problem. The proposed work ensures greater security with the aid of a smaller key size. It also ensures less computational time, less memory and communication bandwidth

Keywords


Elliptic Curve Cryptography, Elliptic Curve Diffie-Hellman, Elliptic Curve Integrated Encryption Scheme, Elliptic curve Digital Signature Algorithm, Verifiable Delegation(VD), Hybrid Encryption.

Full Text:

PDF

References


Jie Xu, Qiaoyan Wen, Wenmin Li and Zhengping Jin, “ Circuit Cipher-text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing” in Proc. IEEE Transactions on parallel and distributed systems, 2016.

K. Kurosawa and Y. Desmedt,”A New Paradigm of Hybrid Encryption Scheme,” in Proc. CRYPTO, pp.426-442, Springer-Verlag Berlin, Heidelberg, 2004.

B.Waters, “Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient and Provably Secure Realization,” inProc. PKC, pp.53-70, Springer-Verlag Berlin, Heidelberg, 2011.

Rakel Haakegaard and Joanna Lang , “ The Elliptic Curve Diffie-Hellman (ECDH)”, December 2015.

Kefa Rabah, “ Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes”, Information Technology Journal 4(2): 132-139, 2005. ISSN 1812-5638.

Andrea Corbellini, “Elliptic Curve Cryptography: ECDH and ECDSA”,

,http://andrea.corbellini.name/2015/05/30/elliptic-curve-cryptography-ecdh-and-ecdsa/, Accessed on June 20, 2017.

Johannes Bauer, “Elliptic Curve Cryptography Tutorial”,

https://www.johannes-bauer.com/compsci/ecc/#anchor24, Accessed on June 20, 2107.

William Stallings, “Cryptography and Network Security Principles and Practices”, Prentice Hall Publications, 4th Edition, 2005.

V. Gayoso, Martínez, L. Hernández Encinas, and C. Sánchez Ávila,” A Survey of the Elliptic Curve Integrated Encryption Scheme”, Journal of Computer Science and Engineering,Volume2, Issue 2, August2 2010




DOI: https://doi.org/10.26483/ijarcs.v8i7.4465

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 International Journal of Advanced Research in Computer Science