Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universitas Indonesia
2015-07-01
|
Series: | International Journal of Technology |
Subjects: | |
Online Access: | http://ijtech.eng.ui.ac.id/article/view/1394 |
id |
doaj-cbff0fcf9a1c4a19b5f3d15167b7880c |
---|---|
record_format |
Article |
spelling |
doaj-cbff0fcf9a1c4a19b5f3d15167b7880c2020-11-24T21:49:55ZengUniversitas IndonesiaInternational Journal of Technology2086-96142087-21002015-07-016332733510.14716/ijtech.v6i3.13941394Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud ComputingDevi Thiyagarajan0Ganesan R.1School of Computing Science and Engineering, VIT University, Chennai Campus Vandalur - Kelambakkam Road, Chennai - 600127, IndiaSchool of Computing Science and Engineering, VIT University, Chennai Campus Vandalur - Kelambakkam Road, Chennai - 600127, IndiaData owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud.http://ijtech.eng.ui.ac.id/article/view/1394Cloud, Curve, Cryptography, Encryption, Hyperelliptic, Integrity, Security |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Devi Thiyagarajan Ganesan R. |
spellingShingle |
Devi Thiyagarajan Ganesan R. Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing International Journal of Technology Cloud, Curve, Cryptography, Encryption, Hyperelliptic, Integrity, Security |
author_facet |
Devi Thiyagarajan Ganesan R. |
author_sort |
Devi Thiyagarajan |
title |
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing |
title_short |
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing |
title_full |
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing |
title_fullStr |
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing |
title_full_unstemmed |
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing |
title_sort |
data security model employing hyperelliptic curve cryptography (hecc) and secure hash algorithm-3 (sha-3) in cloud computing |
publisher |
Universitas Indonesia |
series |
International Journal of Technology |
issn |
2086-9614 2087-2100 |
publishDate |
2015-07-01 |
description |
Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out
computations. To eliminate the burden of storing file locally, cloud stores
them on remote servers using virtualization concepts. Therein arises one of the
major issues in the field of cloud computing: security. Data owners lack in
having direct control over files stored in the cloud and consequently, the
problem of data security arises. An efficient scheme to provide data security,
while storing data in the cloud has been proposed which makes use of Hyperelliptic
curve cryptography (HECC) for encryption and decryption and Secure Hash
Algorithm-3 (SHA-3) for data integrity verification. Implementation results
clearly illustrate that HECC remains as a good alternative asymmetric key
technique rather than ECC and RSA when securing documents in cloud. |
topic |
Cloud, Curve, Cryptography, Encryption, Hyperelliptic, Integrity, Security |
url |
http://ijtech.eng.ui.ac.id/article/view/1394 |
work_keys_str_mv |
AT devithiyagarajan datasecuritymodelemployinghyperellipticcurvecryptographyheccandsecurehashalgorithm3sha3incloudcomputing AT ganesanr datasecuritymodelemployinghyperellipticcurvecryptographyheccandsecurehashalgorithm3sha3incloudcomputing |
_version_ |
1725886457268142080 |