Browse > Article
http://dx.doi.org/10.7472/jksii.2014.15.2.49

An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing  

Yin, XiaoChun (Department of Ubiquitous IT, Dongseo University, Weifang University of Science & Technology)
Thiranant, Non (Department of Ubiquitous IT, Dongseo University)
Lee, HoonJae (Division of Computer and Information Eng., Dongseo University)
Publication Information
Journal of Internet Computing and Services / v.15, no.2, 2014 , pp. 49-58 More about this Journal
Abstract
With the fast development of internet, cloud computing has become the most demanded technology used all over the world. Cloud computing facilitates its consumers by providing virtual resources via internet. One of the prominent services offered in cloud computing is cloud storage. The rapid growth of cloud computing also increases severe security concerns to cloud storage. In this paper, we propose a scheme which allows users not only securely store and access data in the cloud, but also share data with multiple users in a secured way via unsecured internet. We use ECC for cryptography and authentication operation which makes the scheme work in a more efficient way.
Keywords
Secured data storage; Cloud computing; ECC;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 R. Ada Popa, J. Lorch, D. Molnar, H. J. Wang, and L. Zhuang. Enabling security in cloud storage SLAs with cloudproof. Technical Report MSR-TR-2010-46, Microsoft Research, 2010.
2 Zhu, S., Yang, X., & Wu, X.. Secure Cloud File System with Attribute Based Encryption. In Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on (pp. 99-102). IEEE.
3 Zwattendorfer, B., & Tauber, A.. Secure cloud authentication using eIDs. In Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on (Vol. 1, pp. 397-401). IEEE.
4 Stallings, W, "Cryptography and Network Security: Principles and Practices", Prentice Hall, 4th Edition, pp 420-430, 2009.
5 Hankerson, D, Menezes, A, Vanstone, S, "Guide to elliptic curve cryptography", Springer-Verlag, New York, USA, 2004.
6 Koblitz, N, "Elliptic Curve Cryptosystem", Journal of mathematics computation, Vol. 48, No. 177, pp203-209, 1987.   DOI   ScienceOn
7 Miller, V, "Use of elliptic curves in cryptography", Proc. of Advances in Cryptology-CRYPTO' 85, LNCS, Vol. 218, pp. 417-426, 1985.
8 V.Miller, "Uses of elliptic curves in cryptography", Lecture Notes in Computer Science218: Advances in Cryptology- CRYPTO'85, pages417-426, Springer-Verlag, Berlin, 1986.
9 N.Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, 48:203-209, 1987.   DOI   ScienceOn
10 Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), Apr. 2002, http://www.ietf.org/rfc/rfc3278.txt
11 M. Abdalla, M. Bellare, P. Rogaway, DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem, Contribution to IEEE P1363a, 1998,http://cseweb.ucsd.edu/users/mihir/papers/dhaes.pdf.
12 M. Abdalla, M. Bellare, P. Rogaway, The oracle Diffie-Hellman assmptions and an analysis of DHIES, Lecture Notes in Comput. Sci.2020(2001), 143-158.
13 Bundesamt fur Sicherheit in der Information stechnik, Elliptic Curve Cryptography, 2009, https://www.bsi.bund.de/cln 183/EN/Home/home node.html.
14 W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory 22(1976), 644-654.   DOI
15 American National Standards Institute, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1998.
16 V. Gayoso Martinez, L. Hernandez Encinas, and C. Sanchez Avila, Journal of Computer Science and Engineering, Volum 2, Issue 2, August
17 Brainpool, ECC Brainpool Standard Curves and Curve Generation, 2005, http://www.ecc-brainpool.org/download/Domain-parameters.pdf.
18 Arjun Kumar, Byung Gook Lee, HoonJae Lee, Secure Storage and Access of Data in Cloud Computing, ICT Convergence (ICTC), 2012 International Conference on Oct. 15-17, 2012
19 Institute of Electrical and Electronics Engineers, Standard Specifications for Public Key Cryptography-Amendment 1: Additional Techniques, 2004.
20 International Organization for Standardization / International Electro technical Commission, Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers, 2006.
21 N. Koblitz, Elliptic curve cryptosystems, Math. Comp. 48(1987), 203-209.   DOI   ScienceOn
22 V. Gayoso Martinez, L. Hernandez Encinas, C. Sanchez Avila, Security and practical considerations when implementing the Elliptic Curve Integrated Encryption Scheme, preprint, 2010.
23 V. S. Miller, Use of elliptic curves in cryptography, Lecture Notes in Comput.Sci.218(1986), 417-426.
24 J. H. Silverman, The Arithmetic of Elliptic Curves, volume 106 of Graduate texts in Mathematics, Springer-Verlag, New York, NY, USA, 1986.
25 Standards for Efficient Cryptography Group, Recommended Elliptic Curve Domain Parameters, 2000, http://www.secg.org/download/aid-780/sec1-v2.pdf.
26 Standards for Efficient Cryptography Group, Test Vectors for SEC 1, 1999, http://www.secg.org/download/aid-390/gec2.pdf.
27 Standards for Efficient Cryptography Group, Elliptic Curve Cryptography, 2000, http://www.secg.org/download/aid-86/sec2 final.pdf.
28 Hee Won Myeong, Jung Ha Paik, Dong Hoon Lee, "Study on implementation of Secure HTML5 Local Storage," Journal of Korean Society for Internet Information, Vol. 13, No. 4, pp.83-93, Aug. 2012.   과학기술학회마을   DOI
29 Yunho Lee, "An Analysis on the Vulnerability of Secure Keypads for Mobile Devices," Journal of Korean Society for Internet Information, Vol.14, No.5, pp.15-21, June 2013.   과학기술학회마을   DOI   ScienceOn
30 Young Bae Yoon, Junseok Oh, Bong Gyou Lee, "The Important Factors in Security for Introducing the Cloud Services," Journal of Korean Society for Internet Information, Vol. 13, No. 6, pp.33-40, Dec. 2012.   과학기술학회마을   DOI   ScienceOn
31 National Institute of Standards and Technology, Digital Signature Standard (DSS), 2000.
32 Liu, Q., Wang, G., & Wu, J.. Efficient sharing of secure cloud storage services. In Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on (pp. 922-929). IEEE.