International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 110 - Number 15 |
Year of Publication: 2015 |
Authors: Ayman Helmy Mohamed, Aliaa A.a. Youssif, Atef Z. Ghalwash |
10.5120/19395-1069 |
Ayman Helmy Mohamed, Aliaa A.a. Youssif, Atef Z. Ghalwash . Cloud Computing Security Framework based on Elliptical Curve. International Journal of Computer Applications. 110, 15 ( January 2015), 45-51. DOI=10.5120/19395-1069
Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture that employ dynamic load and access balancing. Cloud computing is technology where the clients' can use high end services in form of software that reside on different servers and access data from all over the world. With a promising technology like this, it certainly abandons clients' privacy, management of data and services, putting new security threats towards the assurance of data in cloud. However, there are some security concerns when clients handle and share data in the cloud-computing environment. The security threats such as maintenance of data integrity, data hiding and data safety dominate clients concerns when the issues of cloud security come up. The big data and time-consuming encryption calculations related to applying any encryption method have proved as a hindrance in this field. Cryptography is knowledge of protecting the information for providing encryption techniques In this paper, Cloud computing security framework was tested. The framework ensures a trusted cloud environment that controlled by both the client and the cloud environment. The proposed solution secures the movement of data between client and cloud end. the non-breakability of ElGamal based on Elliptic curve cryptography for data encryption/decryption was used along with Diffie Hellman based on elliptic curve mechanism for connection establishment, The data integrity verification is done by introducing a message digest tag for updating data based on SHA-256. The proposed encryption mechanism uses the combination of elliptical cryptography and SHA-256 methods.