LITERATURE provides more security to user data stored

LITERATURE SURVEYNumber of datasecurity models have been developed to address the data security issues incloud computing. M.R Tribhuwan, V.A Buyar, Shabana pirzade considers the datasecurity model using Two-Way handshake is a method which utilizes the homomorphictoken with distributed verification of erasure-coded data and achieves theintegration of storage correctness insurance and data error localization, i.e.,the identification of misbehaving server(s)3. P.

Syam Kumar, R. Subramanian and D. Thamizh Selvam analyses Sobolsequence method rely on erasure code for the availability, reliability of dataand utilize token pre computation using Sobol Sequence to verify the integrityof erasure coded data rather than Pseudorandom Data in existing system, thisscheme provides more security to user data stored in cloud computing. The performanceanalysis shows that scheme is more secure than existing system againstByzantine failure, unauthorized data modification attacks, and even cloudserver colluding attacks 4. Accoding to Cong Wang, Qian Wang, and Kui Ren, WenjingLou, in public auditing to support efficient handling of multiple auditingtasks, we further explore the technique of bilinear aggregate signature toextend our main result into a multi-user setting, where TPA can performmultiple auditing tasks simultaneously. Extensive security and performanceanalysis shows the proposed schemes are provably secure and highly efficient 5.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

In RSA cryptosystemResearch Paper, Uma Somani, KanikaLakhani, Manish Mundra, have tried to assess Cloud Storage Methodology and DataSecurity in cloud by the Implementation of digital signature with RSA algorithmin paper 6. Recently, Chengliang Wang, Gebeyehu Belay Gebremeskalproposed a model which uses computational intelligence performance. Computationalintelligence (CI) is a mathematical modeling technique of cloud computing, whichare vitally importance to simplifying the complex system and designingproactive and adaptive system in a dynamic and complex environment towards datasecurity 7.M.

Auxilia , K. Raja proposed thesemantic based access control model, which considers relationships among theentities in all domains of access control namely Subject (user),Object(Data/resource), Action(select, open, read, write) and so on, it is alsoshown how to reduce the semantic interrelationships into subsumption problem.This reduction facilitates the propagation of policies in these domains andalso enhances time and space complexity of access control mechanisms 8.Feng-qing Zhang, Dian-Yuan Han, considers applyingagent’s method introducing agents to data security module, provides morereliable services 9. Shuai Han, Jianchuan Xing, proposed anovel third party auditor scheme a third party auditor which affords trustful authenticationfor user to operate their data security in cloud. The obvious advantage of thisscheme is that the cloud service provider can offer the functions which wereprovided by the traditional third party auditor and make it trustful. So itindeed reduces the constitution’s complexity in Cloud Computing 10.

Method proposed in paper 11,Key generation is an importantpart where we have to generate both public key and private key. The sender willbe encrypting the message with receiver’s public key and the receiver willdecrypt using its private key. Now, we have to select a number ‘d’ within the range of ‘n’.The public key can be generatedby using the following equation:Q = d * p ——– (1)Where, d = the random number thatwe have selected within the range of (1 to n-1).

P = the point on the curve.Q = the public key and ‘d’ is theprivate key.EncryptionLet ‘m’ be the message which hasto be sent. We have to represent this message on the curve.

Consider ‘m’ as the point ‘M’ on the curve ‘E’. Randomly select ‘k’ from 1 -(n-1).Cipher texts will begenerated after encryption, let it be C1 and C2.C1 = k * p —– (2)C2 = M + k * Q —— (3)DecryptionThe message ‘M’ that was sent iswritten as following equation,M = C2 – d * C1 —– (4)ProofThe message ‘M’ can be obtainedback using eq. (4)C2 – d * c1 = (M + k * Q) – d *(k * p)We have Q = d * p, by cancellingout k * d * p,We get M (original message) OBJECTIVES1.

      Toidentify the challenging security issues which has to be addressed in cloudcomputing.2.      Toidentify what are the possible solutions to the security issues and challenges.3.      Toidentify the constraints over the elliptic curve cryptography if any.

4.      Toidentify how elliptic curve cryptography algorithm can provide efficient datasecurity and reliability for cloud computing and it is a mechanism whichprovides secure data encryption, decryption as well as secure shield againstthe theft and attacker. METHODOLOGYWhile severaldifferent methodologies are being developed in this rapidly emergingdiscipline, here we outline one that is particular. Table below shows the main stagesof the methodology. In Step 1 we will develop a ‘concept statement’. This is afirst cut at establishing the need for such a project.

The concept statement isfollowed by a description of the project’s significance. Once the conceptstatement is approved, then we can proceed to Step 2, the proposal developmentstage. Here, more details are filled in. Based on the concept statement,several questions are  Table1 Outline of Data Security in Cloud Computing with Elliptic Curve Cryptography Step1 Concept statement• Establish need for EllipticCurve Cryptography for data security in Cloud Computing Step2 Proposal• What is the problem beingaddressed?• Why is it important andinteresting?• Why Elliptic Curve Cryptographyapproach?• Background material Step3 Methodology• Propositions• Variable selection• Data collection• ETL and data transformation• Platform/tool selection• Conceptual model• Analytic techniques-Association, clustering,classification, etc.• Results & insight Step4 Deployment• Evaluation & validation• Testing


I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out