18
Submitted by Sumit kumar Dept. Of CSE,ITER 0911012077 Guided by Sanjaya kumar jena Assistant Professor, Department of Computer Science and Engineering , ITER

Data Security in Cloud Computing Using Elliptic Curve

Embed Size (px)

Citation preview

Page 1: Data Security in Cloud Computing Using Elliptic Curve

Submitted bySumit kumarDept. Of CSE,ITER 0911012077

Guided bySanjaya kumar jenaAssistant Professor,Department of Computer Science and Engineering , ITER

Page 2: Data Security in Cloud Computing Using Elliptic Curve

Cloud Computing – An Introduction Attributes Of The Cloud Cloud Computing Security Challenges Proposed Security Solution Elliptic Curve Cryptography How Elliptic Curve Cryptography can help? Advantages and Disadvantages Conclusion References

Page 3: Data Security in Cloud Computing Using Elliptic Curve

Courtesy: http://www.winky.net/

Page 4: Data Security in Cloud Computing Using Elliptic Curve
Page 5: Data Security in Cloud Computing Using Elliptic Curve

Cloud Computing: Cloud Computing: ChallengesChallenges

Encryption conceptDecryption concept

Page 6: Data Security in Cloud Computing Using Elliptic Curve

Courtesy : www.google.com

Page 7: Data Security in Cloud Computing Using Elliptic Curve
Page 8: Data Security in Cloud Computing Using Elliptic Curve

Encryption Authentication and access control Intrusion Detection and Prevention

Page 9: Data Security in Cloud Computing Using Elliptic Curve

Elliptic curve is an algebraic curve Equation of elliptic curve

Courtesy : www. wikipedia.org

Page 10: Data Security in Cloud Computing Using Elliptic Curve

Consider elliptic curve E: y2 = x3 - x + 1 Let p1(x1,y1), p2(x2,y3), p3(x3,y3) be the three roots of the cubic equation. so these three points are lying on the curve. But after addition of p1 and p2,it becomes p3(say) such as P3 = P1 + P2 .

So initially p1(x1,y1) and p2(x2,y2)

But finally p3({x1+x2},{y1+y2}).

let (x1+x2=x3)

& (y1+y2=y3)

so, p3(x3,y3).

Page 11: Data Security in Cloud Computing Using Elliptic Curve

Encryption algorithm: suppose sender wants to send the message to the receiver-i) Sender [M] Receiver ii) Sender Public Key Encrypted Message [M’]iii) [M’] Receiver

Page 12: Data Security in Cloud Computing Using Elliptic Curve

Decryption algorithm: when the receiver receives the message:i) Receiver [M’] ii) [M’] Decrypted Message [M]

Page 13: Data Security in Cloud Computing Using Elliptic Curve

More cheaper Reduce the company expenditure Increase the current storage or spacescomplete data is stored in the cloud it is very

easy to take backup and restore of files

Page 14: Data Security in Cloud Computing Using Elliptic Curve

data can be accessed by anyone and at anytime

The other main problem in the cloud computing is Security

the possibility of being attacked or harmed even after updating your virus database

Page 15: Data Security in Cloud Computing Using Elliptic Curve

Cloud Computing is something that is going to change how we see computers. It will bring down operating costs leading to wide array of new opportunities. But it will not be able to achieve its rightful position until the issues such as data security and privacy have been resolved.

Page 16: Data Security in Cloud Computing Using Elliptic Curve

[1] Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi “Data Security in Cloud Computing with Elliptic Curve Cryptography”

[2] Deyan Chen,Hong Zhao “Data Security and Privacy Protection Issues in Cloud Computing”

[3] http://en.wikipedia.org/wiki/Cloud_computing

[4] http://www.cloudcomputingchina.cn/Article/luilan/200909/306.html

[5] Google, “Google app Engine,” http://code.google.com/appengine/

[6] http://cloudsecurity.trendmicro.com/

Page 17: Data Security in Cloud Computing Using Elliptic Curve

Queries:

Page 18: Data Security in Cloud Computing Using Elliptic Curve