Skip to main content
Article
Hybrid Elliptic Curve Cryptography Using Ant Colony Based Authentication System for Cloud Computing
ARPN Journal of Engineering and Applied Sciences (2015)
  • HemanthChakravarthy M.
  • Kannan E.
Abstract
In order to meet the recent requirements and environment, the cloud computing become most important resourcefor both industry and personal usage. Hence, cloud computing is the most rapidly growing technology of the past few years. This rapid growth of cloud computing leads to severe security concerns, because security has a critical issue in the cloud computing, as the user / the provider is the third party and many users are sharing a same cloud. One important design issue in the cloud security framework is space complexity of the security model should be very less in order to meet the mobile customers, because many of the users accessing the cloud by the modern hand held devices. Therefore, smaller sizes of security keys are much preferred for encryption algorithm. Hence, this paper proposes elliptical curve cryptography based security mechanism and ant colony optimization based secured key management technique. The proposed system provides better space complexity than existing RSA and CRT, and the ACO improves optimality.
Keywords
  • cloud computing,
  • security,
  • RSA algorithm,
  • elliptic curve cryptography,
  • ant colony optimization
Publication Date
September, 2015
Publisher Statement
References

Abrishami S., Naghibzadeh M. and Epema D. 2012. Cost-driven scheduling of grid workflows using partial critical paths. IEEE Transactions on Parallel and Distributed Systems. 23(8): 1400-1414.

Almorsy M.; Grundy John; Ibrahim A.S. 2011. Collaboration-Based Cloud Computing Security Management Framework. IEEE International Conference on Cloud Computing (CLOUD). pp. 364-371.

AL-Saidi N.M.G., M.R.M. Said and A.M. Ahmed. 2011. Efficiency analysis for public key systems based on fractal functions. J. Comput. Sci. 7: 526-532.

Athavale A.; Singh K.; Sood S. 2009. Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography. First International Conference on Computational Intelligence, Communication Systems and Networks, CICSYN '09. pp. 332-335.

Bai Qing-hai; Zhang Wen-bo; Jiang Peng; Lu Xu. 2012. Research on Design Principles of Elliptic Curve Public Key Cryptography and Its Implementation. International Conference on Computer Science and Service System (CSSS). pp. 1224-1227.

Singh, Kirat Pal, and Shivani Parmar. “Design of High Performance MIPS Cryptography Processor Based on T-DES Algorithm.” International Journal of Engineering 1.3 (2012).

Jarvinen K., Skytta J. 2008. On Parallelization of High-Speed Processors for Elliptic Curve Cryptography. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 16(9): 1162-1175.

Kumar S.K.S. and P. Balasubramanie. 2012. Dynamic scheduling for cloud reliability using transportation problem. J. Comput. Sci. 8: 1615-1626, DOI: 10.3844/jcssp.2012.1615.1626.

Mehdi N.A., A. Mamat, H. Ibrahim and S.K. Subramaniam. 2011. Impatient task mapping in elastic cloud using genetic algorithm. J. Comput. Sci. 7: 877-883, DOI: 10.3844/jcssp.2011.877.883.

Ponnuramu V. and L. Tamilselvan. 2012. Data integrity proof and secure computation in cloud computing. J. Comput. Sci. 8: 1987-1995. DOI: 10.3844/jcssp.2012.1987.1995.

Wang You-Bo, Dong Xiang-Jun, TianZhi-Guang. 2007. FPGA Based Design of Elliptic Curve Cryptography Coprocessor. Third International Conference on Natural Computation (ICNC 2007). pp. 185-189.

Singh, Kirat Pal, and Shivani Parmar. "Low Power Encrypted MIPS Processor Based on AES Algorithm." Journal of Global Research in Computer Science 3.4 (2012): 63-67.

Zehua Zhang; Xuejie Zhang. 2009. Realization of open cloud computing federation based on mobile agent. IEEE International Conference on Intelligent Computing and Intelligent Systems. 3: 642- 646.

HemanthChakravarthy M. and E. Kannan. 2014. A review on secured cloud computing environment. J. Comput. Sci. 11(8): 1224-1228.

HemanthChakravarthy M. and E. Kannan. 2014. Hybrid Elliptic Curve Cryptography for Secured Cloud. International Journal of Applied Engineering Research. 9(24): 29329-29337.
Citation Information
HemanthChakravarthy M. and Kannan E.. "Hybrid Elliptic Curve Cryptography Using Ant Colony Based Authentication System for Cloud Computing" ARPN Journal of Engineering and Applied Sciences (2015)
Available at: http://works.bepress.com/sakshi-sharma/6/
Creative Commons license
Creative Commons License
This work is licensed under a Creative Commons CC_BY-NC International License.