Secure Cloud ECC: Advancing Multi-Tenant Security with an Enhanced Embellished Version of ECC Algorithm

Authors

  • Lalit Kumar Research Scholar, Department of Computer Science & Engineering, Shobhit Institute of Engineering & Technology, (NAAC Accredited Grade "A", Deemed to- be- University), Meerut, India
  • Nidhi Tyagi Professor, Department of Computer Science & Engineering, Shobhit Institute of Engineering & Technology, (NAAC Accredited Grade "A", Deemed to- be- University), Meerut, India
  • Seema Gupta Associate Professor, Ideal Institute of Management & technology, GGSIP University, Delhi, India

Keywords:

Multi-tenant cloud storage, Security, Elliptic Curve Cryptography (ECC), Diffie-Hellman (DH) algorithm, Embellished Elliptic Curve Cryptography (EECC)

Abstract

This paper proposes Embellished Elliptic Curve Cryptography (EECC), a new approach to secure data in multi-tenant cloud storage. EECC leverages the strengths of both ECC and the Diffie-Hellman algorithm, offering robust data protection with smaller key sizes and minimizing key exchange risks. Importantly, EECC outperforms existing methods in various aspects: significantly faster encryption and decryption times, lower computation costs for data transfer, smaller ciphertexts leading to reduced storage needs, and faster key generation. These improvements translate to a more efficient and user-friendly cloud storage experience. While security remains paramount, EECC's efficiency and reduced storage footprint make it a compelling option for cloud storage solutions. Further research could explore additional EECC optimizations and real-world performance evaluation

Downloads

Download data is not yet available.

References

B. Enthoti, G. Chakrapani and H. P. Sydulu, "DATA ACCESS CONTROL USING COMBINED COMPRESSION AND SECURITY MODEL FOR CLOUD STORAGE," vol. 04, no. 05, May 2021.

C. Manthiramoorthy, K. M. S. Khan and others, "Comparing several encrypted cloud storage platforms," International Journal of Mathematics, Statistics, and Computer Science, vol. 2, p. 44–62, 2024.

K. Singh, A. Nayyar and A. Garg, "A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud," Multimedia Tools and Applications, vol. 82, p. 22525–22576, 2023.

R. R. Irshad, Z. Hussain, I. Hussain, S. Hussain, E. Asghar, I. M. Alwayle, K. M. Alalayah, A. Yousif and A. Ali, "Enhancing Cloud-Based Inventory Management: A Hybrid Blockchain Approach With Generative Adversarial Network and Elliptic Curve Diffie Helman Techniques," IEEE Access, vol. 12, p. 25917–25932, 2024.

W. Kaleem, M. Sajid and R. Rajak, "Salp Swarm Algorithm to solve Cryptographic Key Generation problem for Cloud computing," International Journal of Experimental Research and Review, vol. 31, p. 85–97, 2023.

D. Hankerson and A. Menezes, "Elliptic curve cryptography," in Encyclopedia of Cryptography, Security and Privacy, Springer, 2021, p. 1–2.

S. K. Shandilya, B. J. Choi, A. Kumar and S. Upadhyay, "Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity," Processes, vol. 11, p. 715, 2023.

M. A. Pisla, M. Stanculescu, R. F. Porumb, B.-A. Enache and G.-C. Seritan, "Microgrid Cyber Security Enhancement Considerations," in 2023 13th International Symposium on Advanced Topics in Electrical Engineering (ATEE), 2023.

M. Miyamoto, K. Teranishi, K. Emura and K. Kogiso, "Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption," IEEE Access, 2023.

C. Lee and S. Lee, "Evaluating the Vulnerability of YOLOv5 to Adversarial Attacks for Enhanced Cybersecurity in MASS," Journal of Marine Science and Engineering, vol. 11, p. 947, 2023.

Jagatheesan, S. ., Parveen, N. ., Mahajan, D. ., Nerkar, S., Singh, G. ., Khan, H. ., & Kumar, M. . (2023). Long Range (LoRa) Communication Protocol with a Novel Scheduling Mechanism to Minimize the Energy in IoT. International Journal of Intelligent Systems and Applications in Engineering, 12(2), 184–193.

Downloads

Published

24.03.2024

How to Cite

Kumar, L. ., Tyagi, N. ., & Gupta, S. . (2024). Secure Cloud ECC: Advancing Multi-Tenant Security with an Enhanced Embellished Version of ECC Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 720–728. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5235

Issue

Section

Research Article