• International Journal of Technology (IJTech)
  • Vol 6, No 3 (2015)

Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing

Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing

Title: Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
Devi Thiyagarajan, Ganesan R.

Corresponding email:


Published at : 29 Jul 2015
Volume : IJtech Vol 6, No 3 (2015)
DOI : https://doi.org/10.14716/ijtech.v6i3.1117

Cite this article as:

Thiyagarajan, D., Ganesan, R., 2015. Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing. International Journal of Technology. Volume 6(3), pp. 327-335



800
Downloads
Devi Thiyagarajan School of Computing Science and Engineering, VIT University, Chennai Campus Vandalur - Kelambakkam Road, Chennai - 600127, India
Ganesan R. School of Computing Science and Engineering, VIT University, Chennai Campus Vandalur - Kelambakkam Road, Chennai - 600127, India
Email to Corresponding Author

Abstract
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing

Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud.

Cloud, Curve, Cryptography, Encryption, Hyperelliptic, Integrity, Security

References

Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D., 2007. Provable Data Possession at Untrusted Stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–609, New York, USA

Avi?zienis A, Laprie, J., Randell, B., Landwehr, C., 2004. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing, Volume 1(1), pp. 11–33

Berman, F. Fox, G., A. J. G., 2003. Hey, Grid Computing: Making the Global Infrastructure a Reality, Volume 2, John Wiley and Sons

Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G., 2004. Public Key Encryption with Keyword Search. Proc. Int’l Conf. Theory and Applications of Cryptographic Techniques EUROCRYPT

Bowers, K.D., Juels, A., Oprea, A., 2008. HAIL: A High-availability and Integrity Layer for Cloud Storage. Cryptology e-Print Archive, Report 2008/489

Fakhri, I.A-S., Alahmad, M.A., Munthir, K., 2013. Hash Function of Finalist SHA-3: Analysis Study. International Journal of Advanced Computer Science and Information Technology (IJACSIT), Volume 2(2), pp. 1-12

Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Naslund, M., Pourzandi, M., 2012. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. Journal of Cloud Computing, Volume 1(11), pp. 1-18

Juels, A., Burton, J., Kaliski, S., 2007. PORs: Proofs of Retrievability for Large Files. Proceedings of CCS, pp. 584–597

Kamara, S., Lauter, K., 2010. Cryptographic Cloud Storage, Lecture Notes in Computer Science 6054, pp. 136–49

Koblitz, N., 1989. Hyperelliptic Cryptosystems. Journal of Cryptology, Volume 1(3), 1989, pp. 129-150

Latif, R., Abbas, H., Assar, S., Ali, Q., 2014. Cloud Computing Risk Assessment: A Systematic Literature Review. in Future Information Technology, pp. 285–295, Springer, Berlin, Germany

Liu, Q., Tan, C.C., Wu, J., Wang, G., 2011. Reliable Re-encryption in Unreliable Clouds. IEEE Global Telecommunications Conference, pp: 1?5

Mather, T., Kumaraswamy, S., Latif, S., 2009. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media

Modi, C., Patel, D., Borisaniya, B., Patel, A., Muttukrishnan Rajarajan, J., 2013. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing. Journal of Supercomputer, Volume 63, pp. 561-592

Ning, C., Wang, C., Li, M., Ren, K., Lou, W., 2014. Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems, Volume 25 (1), pp. 829-837

Popa, R.A., Lorch, J.R., Molnar, D., Wang, H.J., Zhuang, L., 2010. Enabling Security in Cloud Storage SLAs with Cloudproof. Technical Report, Microsoft Research

Shacham, H., Waters, B., 2008. Compact Proofs of Retrievability. Proceedings of Asiacrypt 5350, pp. 90–107

Sood, Sandeep, K., 2012. A Combined Approach to Ensure Data Security in Cloud Computing. Journal of Network and Computer Applications, Volume 35(6), pp. 1831-1838

Subashini, S., Kavitha, V., 2011. A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, Volume 34(1), pp. 1-11

Sun, Z., Xiong, Zhu, 2014. Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks, Volume 2014, pp. 1-9

Syed, Amid, 2012. Cloud Computing Vs. Grid Computing. ARPN Journal of Systems and Software, Volume 2(5), pp. 188-194

Tao, S., Xinjun, W., 2013. Research of Data Security Model in Cloud Computing Platform for SMEs. International Journal of Security and its Applications, Volume 7(6), pp. 97-108

Wang, C., Cao, N., Li, J., Ren, K., Lou, W., 2010. Secure Ranked Keyword Search over Encrypted Cloud Data. Journal of the ACM, Volume 43(3), pp. 431–73

Wang, C., Cao, N., Li, J., Ren, K., Lou, W., 2010. Secure Ranked Keyword Search over Encrypted Cloud Data. Proc. IEEE 30th Int’l Conf. Distributed Computing Systems (ICDCS)

Wang, C., Cao, N., Li, J., Ren, K., Lou, W., 2012. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Transactions of Parallel and Distributed Systems, Volume 23(8), pp. 1467-1479

Wang, C., Wang, Q., Ren, K., Lou, W., 2009. Ensuring Data Storage Security in Cloud Computing. Quality of service, IWQoS. IEEE 17th International Workshop, pp. 1–9

Xiao, Z., Xiao, Y., 2013. Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, Volume 15(2), pp. 843–859

Zhao, G., Chunming, R., Jin, L., Feng, Z., Yong, T., 2010. Trusted Data Sharing over Untrusted Cloud Storage Providers. Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 97-10