Open Access Open Access  Restricted Access Subscription Access

Performance of Evaluation for AES with ECC in Cloud Environment


Affiliations
1 Department of Computer Science and Engineering, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, India
2 Department of Computer Science and Engineering, JNTUA College of Engineering Pulivendula, Kadapa, Andhra Pradesh – 516390, India
3 Department of Computer Science and Engineering,, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, India
 

During the day; Technology is Cloud, where people can share resources, services and information across the Internet. Due to information on the Internet, security is considered a major problem. The information should be protected by an unauthorized user and should be sent to a person with a private and confidential intent. On this proposed work, to provide a secure method, secure connection, authentication, confidentiality and third-party data protection in cloud computing. In the combination of the Advanced Encryption Standard (AES) and Cryptographic Curve Cryptography (ECC) analyzing of different parameters like storage, encryption time, decryption time and correlation. The results show that the impact of this integrated approach is more important than the other secure algorithms.

Keywords

Security, Advanced Encryption Standard, Elliptic Curve Cryptography, Cloud Computing, Cryptography Algorithms, Authentication, Privacy, Confidentially.
User
Notifications
Font Size

  • B. Hari Krishna, S. Kiran, G. Murali, R. Pradeep Kumar Reddy. "Security Issues in Service Model of Cloud Computing Environment", Procedia Computer Science, 2016.
  • B. Harikrishna, S. Kiran, R. Pradeep kumar Reddy. "Protection on sensitive information in cloud — Cryptography algorithms", 2016 International Conference on Communication and Electronics Systems (ICCES), 2016.
  • D. E. Denning, “Cryptography and Data Security”, Addison-Wesley Publishing Company, America, (1982).
  • G. C. Kessler, “An overview of cryptography”, [Online], Available: ,http://www.garykessler.net/ library/crypto.html# purpose, (1998).
  • P. Patil, P. Narayankar, N. D. G. and M. S. M, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish”, Procedia Computer Science, (2016); Nagpur, India.
  • P. Prajapati, N. Patel, R. Macwan, N. Kachhiya and P. Shah, “Comparative Analysis of DES, AES, RSA Encryption Algorithms”, International Journal of Engineering and Management Research, vol. 4, no. 1, (2014), pp. 132-134.
  • P. Mahajan and A. Sachdeva, “A study of Encryption algorithms AES, DES and RSA for security”, Global Journal of Computer Science and Technology, vol. 13, no. 15, (2013).
  • Y. Wang and M. Hu, “Timing evaluation of the known cryptographic algorithms”, International Conference on Computational Intelligence and Security, (2009).
  • V. R. Pancholi and B. P. Patel, “Enhancement of Cloud Computing Security with Secure Data Storage using AES”, International Journal for Innovative Research in Science and Technology, vol. 2, no. 09, (2016), pp. 18-21.
  • P. Kumar and S. B. Rana, “Development of modified AES algorithm for data security”, Optik-International Journal for Light and Electron Optics, vol. 127, no. 04, (2016), pp. 2341-2345.
  • A. K. Mandal, C. Parakash and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES”, Electrical, Electronics and Computer Science (SCEECS), (2012).
  • A. A. Hasib and A. A. M. Haque, “A comparative study of the performance and security issues of AES and RSA cryptography”, Third International Conference on Convergence and Hybrid Information Technology, (2008).
  • K. Rege, N. Goenka, P. Bhutada and S. Mane, “Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA”, International Journal of Computer Applications, vol. 71, no. 22, (2013).
  • R. R. Ahirwal and M. Ahke, “Elliptic curve diffiehellman key exchange algorithm for securing hypertext information on wide area network”, International Journal of Computer Science and Information Technologies, vol. 4, no. 2, (2013), pp. 363-368.
  • A. Pourali, M. V. Malakooti and M. H. Yektaie, “A Secure SMS Model in E-Commerce Payment using Combined AES and ECC Encryption Algorithms”, The International Conference on Computing Technology and Information Management (ICCTIM), (2014).
  • B. Ji, L. Wang and Q. Yang, “New Version of AES-ECC Encryption System Based on FPGA in WSNs”, Journal of Software Engineering, vol. 9, no. 1, (2015), pp. 87-95.
  • N. Jha and B. Patel, “Forward Secrecy For Google HTTPS using Elliptic Curve Diffie-Hellman Key”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1, no. 9, (2012).
  • Dr.Smith Jones.” AN EMPIRICAL CRYPTOGRAPHY ALGORITHM FOR CLOUD SECURITY BASED ON HASH ENCRYPTION”, International Journal of Computing and Corporate Research ISSN (Online) : 2249- 054X Volume 4 Issue 4 July 2014 International Manuscript ID : 2249054XV4I4072014-43.
  • A method for obtaining digital signatures and public key cryptosystems, R.Rivest, A.Shamir and L.Adleman “communication of the association for computing machinery “ 1978, pp 120-126.
  • RSA algorithm using modified subset sum cryptosystem, Sonal Sharma, Computer and Communication Technology (ICCCT), pp-457-461, IEEE 2011.
  • Harikrishna, B. (2018). Network as a Service Model in Cloud Authentication by HMAC Algorithm.
  • Harikrishna Bommala, S. Kiran (2018). Client Authentication as a Service in Microsoft Azure, vol 8, issues 2, IJEAT.

Abstract Views: 183

PDF Views: 0




  • Performance of Evaluation for AES with ECC in Cloud Environment

Abstract Views: 183  |  PDF Views: 0

Authors

Harikrishna Bommala
Department of Computer Science and Engineering, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, India
S. Kiran
Department of Computer Science and Engineering, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, India
M. Pujitha
Department of Computer Science and Engineering, JNTUA College of Engineering Pulivendula, Kadapa, Andhra Pradesh – 516390, India
R. Pradeep Kumar Reddy
Department of Computer Science and Engineering,, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, India

Abstract


During the day; Technology is Cloud, where people can share resources, services and information across the Internet. Due to information on the Internet, security is considered a major problem. The information should be protected by an unauthorized user and should be sent to a person with a private and confidential intent. On this proposed work, to provide a secure method, secure connection, authentication, confidentiality and third-party data protection in cloud computing. In the combination of the Advanced Encryption Standard (AES) and Cryptographic Curve Cryptography (ECC) analyzing of different parameters like storage, encryption time, decryption time and correlation. The results show that the impact of this integrated approach is more important than the other secure algorithms.

Keywords


Security, Advanced Encryption Standard, Elliptic Curve Cryptography, Cloud Computing, Cryptography Algorithms, Authentication, Privacy, Confidentially.

References