Search Everything

Find articles, journals, projects, researchers, and more

Back to Articles

Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing

Authors:
Devi Thiyagarajan, Ganesan R.

Abstract

Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud.

Keywords: Cloud Curve Cryptography Encryption Hyperelliptic Integrity Security
DOI: https://doi.ms/10.00420/ms/1345/E6CDK/SKJ | Volume: 6 | Issue: 3 | Views: 0
Download Full Text (Free)
Article Document
1 / 1
100%

Subscription Required

Your subscription has expired. Please renew your subscription to continue downloading articles and access all premium features.

  • Unlimited article downloads
  • Access to premium content
  • Priority support
  • No ads or interruptions

Upload

To download this article, you can either subscribe for unlimited downloads, or upload 0 items (articles and/or projects) to download this specific article.

Total: 0 / 0
  • Choose any combination (e.g., 2 articles + 1 project = 3 total)
  • After uploading, you can download this specific article
  • Or subscribe for unlimited downloads of all articles