Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Data Security for Cloud Computing based on Elliptic Curve Integrated Encryption Scheme (ECIES) and Modified Identity based Cryptography (MIBC)

Salim Ali Abbas, Amal Abdul Baqi Maryoosh. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Salim Ali Abbas, Amal Abdul Baqi Maryoosh
10.5120/ijais2016451517
Download full text
  1. Salim Ali Abbas and Amal Abdul Baqi Maryoosh. Article: Data Security for Cloud Computing based on Elliptic Curve Integrated Encryption Scheme (ECIES) and Modified Identity based Cryptography (MIBC). International Journal of Applied Information Systems 10(6):7-13, March 2016. BibTeX

    @article{key:article,
    	author = "Salim Ali Abbas and Amal Abdul Baqi Maryoosh",
    	title = "Article: Data Security for Cloud Computing based on Elliptic Curve Integrated Encryption Scheme (ECIES) and Modified Identity based Cryptography (MIBC)",
    	journal = "International Journal of Applied Information Systems",
    	year = 2016,
    	volume = 10,
    	number = 6,
    	pages = "7-13",
    	month = "March",
    	note = "Published by Foundation of Computer Science (FCS), NY, USA"
    }
    

Abstract

Companies tends towards more availability, less cost, managed risk-all of which are providing by cloud computing. The cloud computing is a way to deliver IT services on demand and pay per usage, and it can stores huge amount of data. But until now many companies don’t wish to use the cloud computing technology due to concerns about data secrecy and protection. This paper aims to provide a secure, effective, and flexible method to improve data security in cloud computing. The test results show that the key generation complexity will decrease and not need to certificate issued because the use of MIBC, also the use of ECIES provides data confidentiality and data integrity.

Reference

  1. Jeffrey Voas and Jia Zhang. 2009. Cloud Computing: New Wine or Just a New Bottle?. Published by the IEEE Computer Society.
  2. Sameeh A. Jassim. 2013. Mediated IBC-Based Management System of Identity and Access in Cloud Computing. MSc thesis. College of Computer, University of Anbar.
  3. Salim A. Abbas and Amal A. Maryoosh. 2015. Improving Data Storage Security in Cloud Computing Using Elliptic Curve Cryptography. IOSR Journal of Computer Engineering, Volume 17, Issue 4, Ver. I.
  4. Suli Wang and Ganlai Liu. 2011. File encryption and decryption system based on RSA algorithm. International Conference Computational and Information Sciences (ICCIS).
  5. Abbas Amini. 2012. Secure Storage in Cloud Computing. MSc thesis. Department of Informatics and Mathematical Modelling (IMM), the Technical University of Denmark.
  6. Puneetha C. and M. Dakshayini. 2014. Data Security in Cloud Using Elliptic Curve Cryptography. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 5.
  7. Debajyoti Mukhopadhyay et al, 2014. Securing the Data in Clouds with Hyperelliptic Curve Cryptography. Available at: http://arxiv.org/ftp/arxiv/papers/1411 /1411.6771.pdf.
  8. Swarnalata Bollavarapu and Bharat Gupta. 2014. Data Security in Cloud Computing. International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3.
  9. Ravi Gharshi and Suresha. 2013. Enhancing Security in Cloud Storage using ECC Algorithm. International Journal of Science and Research (IJSR), Volume 2 Issue 7.
  10. Chester Rebeiro. 2009. Architecture Explorations for Elliptic Curve Cryptography on FPGAS. M.Sc. thesis. Department of Computer Science and Engineering, Indian Institute of Technology, Madras.
  11. William Stallings. 2011. Cryptography and Network Security principles and practice. 5th edition. Pearson Education, Inc.
  12. Ali Makki Sagheer. 2004. Enhancement of Elliptic Curve Cryptography Methods. MSc thesis. Computer Science, University of Technology.
  13. Darrel Hankerson, Alfred Menezes and Scott Vanstone, 2004. Guide to Elliptic Curve Cryptography. Springer-Verlag New York.
  14. Majid Khabbazian. 2004. Software Elliptic Curve Cryptography. MSc thesis. Department of Electrical and Computer Engineering, University of Victoria.
  15. Manali Dubal and Aaradhana Deshmukh. 2013. Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture. International Journal of Computer Applications, Volume 69– No.24.
  16. V. Gayoso Martínez, L. Hernández Encinas and C. Sánchez Ávila. 2010. A Survey of the Elliptic Curve Integrated Encryption Scheme. JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 2, ISSUE 2.
  17. Marc Joye and Gregory Neven. 2009. Identity Based cryptography. IOS Press.
  18. Joonsang Baek et al. 2004. A Survey of Identity-Based Cryptography. Australian Unix Users Group Annual Conference.
  19. Divya Nalla and K.C.Reddy. 2003. Signcryption scheme for Identity-based Cryptosystems. Mathematics of Computation.
  20. Liang Yan, Chunming Rong, and Gansen Zhao. 2009. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. Springer-Verlag Berlin Heidelberg.

Keywords

Cloud computing, Cryptography, Elliptic Curve, Data security