An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment

Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level...

Full description

Saved in:
Bibliographic Details
Main Authors: Vinothkumar Muthurajan, Balaji Narayanasamy
Format: Article
Language:English
Published: Wiley 2016-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2016/4913015
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832548480027983872
author Vinothkumar Muthurajan
Balaji Narayanasamy
author_facet Vinothkumar Muthurajan
Balaji Narayanasamy
author_sort Vinothkumar Muthurajan
collection DOAJ
description Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level compared to asymmetric key (RSA, AES, and ECC) schemes. The presence of expired content and the irrelevant resources cause unauthorized data access adversely. This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. The HCSA-based auditing improves the malicious activity prediction during the data transfer. The duplication in the cloud server degrades the performance of EC-Schnorr based encryption schemes. This paper utilizes the blooming filter concept to avoid the cloud server duplication. The combination of EC-Schnorr and blooming filter efficiently improves the security performance. The comparative analysis between proposed HCSA and the existing Distributed Hash Table (DHT) regarding execution time, computational overhead, and auditing time with auditing requests and servers confirms the effectiveness of HCSA in the cloud security model creation.
format Article
id doaj-art-96bf5065ef1748918484e6e45d1a1634
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2016-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-96bf5065ef1748918484e6e45d1a16342025-02-03T06:13:57ZengWileyThe Scientific World Journal2356-61401537-744X2016-01-01201610.1155/2016/49130154913015An Elliptic Curve Based Schnorr Cloud Security Model in Distributed EnvironmentVinothkumar Muthurajan0Balaji Narayanasamy1Department of CSE, University College of Engineering, Dindigul, Tamil Nadu 624622, IndiaDepartment of Information Technology, KLN College of Engineering, Madurai, Tamil Nadu 630612, IndiaCloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level compared to asymmetric key (RSA, AES, and ECC) schemes. The presence of expired content and the irrelevant resources cause unauthorized data access adversely. This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. The HCSA-based auditing improves the malicious activity prediction during the data transfer. The duplication in the cloud server degrades the performance of EC-Schnorr based encryption schemes. This paper utilizes the blooming filter concept to avoid the cloud server duplication. The combination of EC-Schnorr and blooming filter efficiently improves the security performance. The comparative analysis between proposed HCSA and the existing Distributed Hash Table (DHT) regarding execution time, computational overhead, and auditing time with auditing requests and servers confirms the effectiveness of HCSA in the cloud security model creation.http://dx.doi.org/10.1155/2016/4913015
spellingShingle Vinothkumar Muthurajan
Balaji Narayanasamy
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
The Scientific World Journal
title An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
title_full An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
title_fullStr An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
title_full_unstemmed An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
title_short An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
title_sort elliptic curve based schnorr cloud security model in distributed environment
url http://dx.doi.org/10.1155/2016/4913015
work_keys_str_mv AT vinothkumarmuthurajan anellipticcurvebasedschnorrcloudsecuritymodelindistributedenvironment
AT balajinarayanasamy anellipticcurvebasedschnorrcloudsecuritymodelindistributedenvironment
AT vinothkumarmuthurajan ellipticcurvebasedschnorrcloudsecuritymodelindistributedenvironment
AT balajinarayanasamy ellipticcurvebasedschnorrcloudsecuritymodelindistributedenvironment