CFP last date
20 December 2024
Reseach Article

Web-Cloud-based Security Services Based-on Elliptic Curves Cryptosystem

by Victor Onomza Waziri, Hakimi Danladi, John K. Alhassan, Faiza Babakano Jada
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 23
Year of Publication: 2015
Authors: Victor Onomza Waziri, Hakimi Danladi, John K. Alhassan, Faiza Babakano Jada
10.5120/20290-2146

Victor Onomza Waziri, Hakimi Danladi, John K. Alhassan, Faiza Babakano Jada . Web-Cloud-based Security Services Based-on Elliptic Curves Cryptosystem. International Journal of Computer Applications. 115, 23 ( April 2015), 12-18. DOI=10.5120/20290-2146

@article{ 10.5120/20290-2146,
author = { Victor Onomza Waziri, Hakimi Danladi, John K. Alhassan, Faiza Babakano Jada },
title = { Web-Cloud-based Security Services Based-on Elliptic Curves Cryptosystem },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 23 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number23/20290-2146/ },
doi = { 10.5120/20290-2146 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:55:40.572704+05:30
%A Victor Onomza Waziri
%A Hakimi Danladi
%A John K. Alhassan
%A Faiza Babakano Jada
%T Web-Cloud-based Security Services Based-on Elliptic Curves Cryptosystem
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 23
%P 12-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper dwells theoretically on the application of Elliptic Curves Cryptography (ECC) for the web and Cloud and Cloud Computing environments. ECC is still in its embryonic utility formation unlike the RSA that has gained much ground in its application on the web security as it offers extensive applications to the various aspects of authentications, e-commerce and mobile phones; but it consumes a lot of power that may not be useful to Smartphones in the context of Mobile cloud computing. Notwithstanding, there is some remarkable deployment of ECC for web security currently on-going This paper establishes the position and role of ECC in the web computing environment. A general introduction to the web and security threats emerging from the use of the web is discussed. Different types of security protocols on the web (IPSec, SSL/TLS and SSH) are discussed. The paper expounds how ECC is deployed on the SSL/TLS protocol-the dominant security protocol on the web- to contain the adversaries. Moreover, we made an effort to discover why people may make the choice of ECC over other cryptographic systems like RSA and discrete logarithm cryptographic systems. Finally, with the hype in mobile Cloud Computing, the paper discusses the security implementations how ECC is applied on Digital Signature

References
  1. Z. Brakerski, C. Gentry, And V. Vaikuntanathan,"(Leveled) Fully Homomorphic Encryption Without Bootstrapping," In Itcs, 2012
  2. Kleinberg, J. and Lawrence, S. (2001). The Structure of the Web. SCIENCE Vol. 294, Page 1849-1850 www. sciencemag. org. (30th March, 2014). Darrel, H. , Menezes A. , Vanstone S. (2004). Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc 2004. Volume 19 preface
  3. Gupta, V. , Stebila, D. , Shantz, S. C. ( 2004). Integrating elliptic curve cryptography into the web's security infrastructure.
  4. Gupta, V. , Stebila, D. , Fung, S. , Shantz, S. C, Gura, N. , Eberle, H. (2004). Speeding up Secure Web Transactions Using Elliptic Curve Cryptography. NDSS
  5. William S. (2007) Data and Computer Communications. Eight Edition, Pearson Prentice Hall.
  6. Ajay K. , Antony J. , Gaurav K. , Hari V. , Hoa L. , Ning C. , Rick A. (2013) White Paper: Elliptic Curve Cryptography (ECC) Certificates Performance Analysis.
  7. Koblitz, N. (1987). Elliptic Curve Cryptosystem. Journal of mathematics computation. 48, 177
  8. sharat. N. New Generation Cryptosystems using Elliptic Curve Cryptography.
  9. Joppe W. Bos, J. , Alex H. , Nadia H. , Jonathan M. , Michael N. , Eric W. (2013)
  10. Elliptic Curve Cryptography in Practice. IACR Cryptology ePrint Archive 2013: 734 (2013)
  11. Vipul G. , Sumit G. , Sheueling C. S. , Douglas S. (2002) Performance analysis of elliptic curve cryptography for SSL. Workshop on Wireless Security 87-94.
  12. Rajkumar B. , James, B. , Andrzej, G. (2001). Cloud Computing Principles and Paradigms. John Wisely, New Jersey
  13. Bethencourt . J. , A. Sahai, and Waters. (. B. 2007). Cipher Policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy, 321-334
  14. XiaoChun Y. , ZengGuang L. , Hoon J. L. (2014). An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-based PKI. IEEE 16th International Conference on Advanced Communication and Technology (ICACT)
  15. Alowolodu O. D, Alese B. K, Adetunmbi A. O. , Adewale O. S, Ogundele O. S. (2013): Elliptic Curve Cryptography for Securing Cloud Computing Applications, International Journal of Computer Applications, Volume 66, No 23
  16. Jonathan K, Yehunde L. (2008), Introduction to Modern Cryptography; Chaman & Hall/CRC; Taylor and Francis Group; ISSN 978-1-58488-531-1 (all paper)
  17. Victor O. Waziri, Ojeniyi J. Adebayo, Hakimi Danladi, Audu Isah, Abubakar S. Magaji, Muhammad Bashir Abdullahi (2013):Network Security in Cloud Computing with Elliptic Curve Cryptography; Network Communication Technogies; Vol 2 No. 2, ISSN 1927-064X, E-ISSN 1927-0658; published by Canadian Center of Science Education
  18. Bell, E. T. and Mathematical Association of America (1951). Mathematics, queen and servant of science. McGraw-Hill New York. p. 228
  19. Maugh II, Thomas H. (2008-09-27). "UCLA mathematicians discover a 13-million-digit prime number". Los Angeles Times. Retrieved 2011-05-21.
Index Terms

Computer Science
Information Sciences

Keywords

Public-key cryptography Elliptic Curve Cryptography (ECC) Web security Secure Socket Layer (SSL) Cloud computing