Mohammad Kashif, S. Mehfuz, Iman Shkeel, Shahnawaz Ahmad
{"title":"Employing an ECC-Based Hybrid Data Encryption Method to Improve Multitenancy Security in Cloud Computing","authors":"Mohammad Kashif, S. Mehfuz, Iman Shkeel, Shahnawaz Ahmad","doi":"10.1109/REEDCON57544.2023.10150684","DOIUrl":null,"url":null,"abstract":"Due to reduced key size, Elliptic Curve Cryptography (ECC) was utilized in this study for tenant authentication, data encryption, and decryption. The proposed ECC-based authentication technique efficiently defends against many related threats while allowing authorized users access to confidential data. The authors choose the exact and ideal values of elliptic curves to provide more secure data encryption by combining nature-inspired optimizations like the Moth Search Algorithm (MSA) with ECC. The DNS encryption and the ECC encryption technique are combined in the proposed encryption and decryption method. Analysis of the proposed method's security shows that it is effective against certain types of attacks, including denial-of-service attacks, spoofing attacks, reaction attacks, and simple both the selected ciphertext attack and text attacks.","PeriodicalId":429116,"journal":{"name":"2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/REEDCON57544.2023.10150684","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Due to reduced key size, Elliptic Curve Cryptography (ECC) was utilized in this study for tenant authentication, data encryption, and decryption. The proposed ECC-based authentication technique efficiently defends against many related threats while allowing authorized users access to confidential data. The authors choose the exact and ideal values of elliptic curves to provide more secure data encryption by combining nature-inspired optimizations like the Moth Search Algorithm (MSA) with ECC. The DNS encryption and the ECC encryption technique are combined in the proposed encryption and decryption method. Analysis of the proposed method's security shows that it is effective against certain types of attacks, including denial-of-service attacks, spoofing attacks, reaction attacks, and simple both the selected ciphertext attack and text attacks.