{"title":"An efficient Technique for Data Security using Improved Elliptic Curve Cryptosystem over Cloud Computing","authors":"None Sunil Manoi, None S C Lingareddy","doi":"10.32628/cseit239053","DOIUrl":null,"url":null,"abstract":"Recent years have seen a rapid expansion of the cloud computing industry, which may be visualized as a distributed computing environment where cloud resources can be distributed shared. In comparison to traditional systems, there are thousands of computers operating in parallel, completing the specified task quickly. The parallel processing is made possible by the low cost of these virtualized hardware resources. In this paper, we discuss several cloud deployment options and how they differ from conventional computers in terms of security. Different methods that minimize the cloud and the limitations of current cryptographic techniques can be used to analyse this security. This research introduces ecliptic curve cryptography technique for various cloud-based applications and compares this technique with existing RSA algorithm-based applications to analyse the security in deployment models. The suggested elliptic curve based public key cryptography is shown to be superior to the current RSA algorithm based applications in this paper's experimental and theoretical results. Our experimental findings show that the suggested ECA approach outperforms the RSA algorithm. This aids in the use of security solutions for the various cloud computing deployment patterns that have been studied.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32628/cseit239053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Recent years have seen a rapid expansion of the cloud computing industry, which may be visualized as a distributed computing environment where cloud resources can be distributed shared. In comparison to traditional systems, there are thousands of computers operating in parallel, completing the specified task quickly. The parallel processing is made possible by the low cost of these virtualized hardware resources. In this paper, we discuss several cloud deployment options and how they differ from conventional computers in terms of security. Different methods that minimize the cloud and the limitations of current cryptographic techniques can be used to analyse this security. This research introduces ecliptic curve cryptography technique for various cloud-based applications and compares this technique with existing RSA algorithm-based applications to analyse the security in deployment models. The suggested elliptic curve based public key cryptography is shown to be superior to the current RSA algorithm based applications in this paper's experimental and theoretical results. Our experimental findings show that the suggested ECA approach outperforms the RSA algorithm. This aids in the use of security solutions for the various cloud computing deployment patterns that have been studied.