Short on time?

Get essay writing help

Data Security in Cloud Using Elliptic Curve Cryptography

Topics:
Words: 454
Page: 1
This essay sample was donated by a student to help the academic community. Papers provided by EduBirdie writers usually outdo students' samples.

Number of data security models have been developed to address the data security issues in cloud computing. M.R Tribhuwan, V.A Buyar, Shabana pirzade considers the data security model using Two-Way handshake is a method which utilizes the homomorphic token with distributed verification of erasure-coded data and achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s).

P. Syam Kumar, R. Subramanian and D. Thamizh Selvam analyses Sobol sequence method rely on erasure code for the availability, reliability of data and utilize token pre computation using Sobol Sequence to verify the integrity of erasure coded data rather than Pseudorandom Data in existing system, this scheme provides more security to user data stored in cloud computing. The performance analysis shows that scheme is more secure than existing system against Byzantine failure, unauthorized data modification attacks, and even cloud server colluding attacks.

Accoding to Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou, in public auditing to support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.

Save your time!
We can take care of your essay
  • Proper editing and formatting
  • Free revision, title page, and bibliography
  • Flexible prices and money-back guarantee
Place Order
document

In RSA cryptosystem Research Paper, Uma Somani, Kanika Lakhani, Manish Mundra, have tried to assess Cloud Storage Methodology and Data Security in cloud by the Implementation of digital signature with RSA algorithm in paper.

Recently, Chengliang Wang, Gebeyehu Belay Gebremeskal proposed a model which uses computational intelligence performance. Computational intelligence (CI) is a mathematical modeling technique of cloud computing, which are vitally importance to simplifying the complex system and designing proactive and adaptive system in a dynamic and complex environment towards data security.

M. Auxilia , K. Raja proposed the semantic based access control model, which considers relationships among the entities in all domains of access control namely Subject (user), Object(Data/resource), Action(select, open, read, write) and so on, it is also shown how to reduce the semantic interrelationships into subsumption problem. This reduction facilitates the propagation of policies in these domains and also enhances time and space complexity of access control mechanisms. Feng-qing Zhang, Dian-Yuan Han, considers applying agent’s method introducing agents to data security module, provides more reliable services.

Shuai Han, Jianchuan Xing, proposed a novel third party auditor scheme a third party auditor which affords trustful authentication for user to operate their data security in cloud. The obvious advantage of this scheme is that the cloud service provider can offer the functions which were provided by the traditional third party auditor and make it trustful. So it indeed reduces the constitution’s complexity in Cloud Computing.

Make sure you submit a unique essay

Our writers will provide you with an essay sample written from scratch: any topic, any deadline, any instructions.

Cite this Page

Data Security in Cloud Using Elliptic Curve Cryptography. (2022, September 15). Edubirdie. Retrieved March 29, 2024, from https://edubirdie.com/examples/data-security-in-cloud-using-elliptic-curve-cryptography/
“Data Security in Cloud Using Elliptic Curve Cryptography.” Edubirdie, 15 Sept. 2022, edubirdie.com/examples/data-security-in-cloud-using-elliptic-curve-cryptography/
Data Security in Cloud Using Elliptic Curve Cryptography. [online]. Available at: <https://edubirdie.com/examples/data-security-in-cloud-using-elliptic-curve-cryptography/> [Accessed 29 Mar. 2024].
Data Security in Cloud Using Elliptic Curve Cryptography [Internet]. Edubirdie. 2022 Sept 15 [cited 2024 Mar 29]. Available from: https://edubirdie.com/examples/data-security-in-cloud-using-elliptic-curve-cryptography/
copy
Join 100k satisfied students
  • Get original paper written according to your instructions
  • Save time for what matters most
hire writer

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via support@edubirdie.com.

Check it out!
close
search Stuck on your essay?

We are here 24/7 to write your paper in as fast as 3 hours.