Secure Cloud ECC: Advancing Multi-Tenant Security with an Enhanced Embellished Version of ECC Algorithm
Keywords:
Multi-tenant cloud storage, Security, Elliptic Curve Cryptography (ECC), Diffie-Hellman (DH) algorithm, Embellished Elliptic Curve Cryptography (EECC)Abstract
This paper proposes Embellished Elliptic Curve Cryptography (EECC), a new approach to secure data in multi-tenant cloud storage. EECC leverages the strengths of both ECC and the Diffie-Hellman algorithm, offering robust data protection with smaller key sizes and minimizing key exchange risks. Importantly, EECC outperforms existing methods in various aspects: significantly faster encryption and decryption times, lower computation costs for data transfer, smaller ciphertexts leading to reduced storage needs, and faster key generation. These improvements translate to a more efficient and user-friendly cloud storage experience. While security remains paramount, EECC's efficiency and reduced storage footprint make it a compelling option for cloud storage solutions. Further research could explore additional EECC optimizations and real-world performance evaluation
Downloads
References
B. Enthoti, G. Chakrapani and H. P. Sydulu, "DATA ACCESS CONTROL USING COMBINED COMPRESSION AND SECURITY MODEL FOR CLOUD STORAGE," vol. 04, no. 05, May 2021.
C. Manthiramoorthy, K. M. S. Khan and others, "Comparing several encrypted cloud storage platforms," International Journal of Mathematics, Statistics, and Computer Science, vol. 2, p. 44–62, 2024.
K. Singh, A. Nayyar and A. Garg, "A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud," Multimedia Tools and Applications, vol. 82, p. 22525–22576, 2023.
R. R. Irshad, Z. Hussain, I. Hussain, S. Hussain, E. Asghar, I. M. Alwayle, K. M. Alalayah, A. Yousif and A. Ali, "Enhancing Cloud-Based Inventory Management: A Hybrid Blockchain Approach With Generative Adversarial Network and Elliptic Curve Diffie Helman Techniques," IEEE Access, vol. 12, p. 25917–25932, 2024.
W. Kaleem, M. Sajid and R. Rajak, "Salp Swarm Algorithm to solve Cryptographic Key Generation problem for Cloud computing," International Journal of Experimental Research and Review, vol. 31, p. 85–97, 2023.
D. Hankerson and A. Menezes, "Elliptic curve cryptography," in Encyclopedia of Cryptography, Security and Privacy, Springer, 2021, p. 1–2.
S. K. Shandilya, B. J. Choi, A. Kumar and S. Upadhyay, "Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity," Processes, vol. 11, p. 715, 2023.
M. A. Pisla, M. Stanculescu, R. F. Porumb, B.-A. Enache and G.-C. Seritan, "Microgrid Cyber Security Enhancement Considerations," in 2023 13th International Symposium on Advanced Topics in Electrical Engineering (ATEE), 2023.
M. Miyamoto, K. Teranishi, K. Emura and K. Kogiso, "Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption," IEEE Access, 2023.
C. Lee and S. Lee, "Evaluating the Vulnerability of YOLOv5 to Adversarial Attacks for Enhanced Cybersecurity in MASS," Journal of Marine Science and Engineering, vol. 11, p. 947, 2023.
Jagatheesan, S. ., Parveen, N. ., Mahajan, D. ., Nerkar, S., Singh, G. ., Khan, H. ., & Kumar, M. . (2023). Long Range (LoRa) Communication Protocol with a Novel Scheduling Mechanism to Minimize the Energy in IoT. International Journal of Intelligent Systems and Applications in Engineering, 12(2), 184–193.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.