Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing

Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud...

Full description

Bibliographic Details
Main Authors: Devi Thiyagarajan, Ganesan R.
Format: Article
Language:English
Published: Universitas Indonesia 2015-07-01
Series:International Journal of Technology
Subjects:
Online Access:http://ijtech.eng.ui.ac.id/article/view/1394
id doaj-cbff0fcf9a1c4a19b5f3d15167b7880c
record_format Article
spelling doaj-cbff0fcf9a1c4a19b5f3d15167b7880c2020-11-24T21:49:55ZengUniversitas IndonesiaInternational Journal of Technology2086-96142087-21002015-07-016332733510.14716/ijtech.v6i3.13941394Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud ComputingDevi Thiyagarajan0Ganesan R.1School of Computing Science and Engineering, VIT University, Chennai Campus Vandalur - Kelambakkam Road, Chennai - 600127, IndiaSchool of Computing Science and Engineering, VIT University, Chennai Campus Vandalur - Kelambakkam Road, Chennai - 600127, IndiaData owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud.http://ijtech.eng.ui.ac.id/article/view/1394Cloud, Curve, Cryptography, Encryption, Hyperelliptic, Integrity, Security
collection DOAJ
language English
format Article
sources DOAJ
author Devi Thiyagarajan
Ganesan R.
spellingShingle Devi Thiyagarajan
Ganesan R.
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
International Journal of Technology
Cloud, Curve, Cryptography, Encryption, Hyperelliptic, Integrity, Security
author_facet Devi Thiyagarajan
Ganesan R.
author_sort Devi Thiyagarajan
title Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
title_short Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
title_full Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
title_fullStr Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
title_full_unstemmed Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
title_sort data security model employing hyperelliptic curve cryptography (hecc) and secure hash algorithm-3 (sha-3) in cloud computing
publisher Universitas Indonesia
series International Journal of Technology
issn 2086-9614
2087-2100
publishDate 2015-07-01
description Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud.
topic Cloud, Curve, Cryptography, Encryption, Hyperelliptic, Integrity, Security
url http://ijtech.eng.ui.ac.id/article/view/1394
work_keys_str_mv AT devithiyagarajan datasecuritymodelemployinghyperellipticcurvecryptographyheccandsecurehashalgorithm3sha3incloudcomputing
AT ganesanr datasecuritymodelemployinghyperellipticcurvecryptographyheccandsecurehashalgorithm3sha3incloudcomputing
_version_ 1725886457268142080