{"title":"Elliptic Curve Cryptography in Cloud Security: A Survey","authors":"Mohammad Anas, Raza Imam, Faisal Anwer","doi":"10.1109/confluence52989.2022.9734138","DOIUrl":null,"url":null,"abstract":"Nowadays, people are using more cloud services than ever before as it provides more storage, collaborative environment, and more security than any other platform. Public Key Cryptography plays a significant role in securing the cloud applications, particularly, Elliptic Curve Cryptography, as its small key size nature is the most suitable aspect in the Cloud. Although, many contributions have been made in recent years to enhance the security aspect of Elliptic Curve approaches in Cloud service by modifications made in the algorithm or in various algorithm phases, but a review work that integrates recent studies providing research directions is missing in the literature. In this paper, we reviewed recent studies along with the various phases of Elliptic Curve Cryptography, which then follows the data analysis of various approaches and techniques. Several research directions and open research problems are derived that would efficiently assist the future relevant research.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/confluence52989.2022.9734138","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Nowadays, people are using more cloud services than ever before as it provides more storage, collaborative environment, and more security than any other platform. Public Key Cryptography plays a significant role in securing the cloud applications, particularly, Elliptic Curve Cryptography, as its small key size nature is the most suitable aspect in the Cloud. Although, many contributions have been made in recent years to enhance the security aspect of Elliptic Curve approaches in Cloud service by modifications made in the algorithm or in various algorithm phases, but a review work that integrates recent studies providing research directions is missing in the literature. In this paper, we reviewed recent studies along with the various phases of Elliptic Curve Cryptography, which then follows the data analysis of various approaches and techniques. Several research directions and open research problems are derived that would efficiently assist the future relevant research.