Secured key sharing in cloud storage using elliptic curve cryptography

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing provides a standard architecture to share the application as same as the other network sharing. It is providing the online storing facility on several servers, which is organized by a trusted authority rather than the resource provider. Sharing the key and managing plays a vital role in sharing the process over cloud computing. Usual processing of the key cryptosystem lacks in efficient safety method; those keys are produced by the existing system. Existing system, proposes the thoughts about aggregate cryptosystem in that the key generated by several origins of the cipher text class, which properly ties the data and related keys. The aggregate key was produced once after losing the key after which it was not possible to access the data. Therefore, to solve the problem, we proposed a novel technique to utilize the key sharing with proper security such as Triple DES algorithm and Elliptic Curve Cryptography (ECC). The Triple DES algorithm is used for file encryption and decryption process. The ECC transmits the secret key. The secret key will be generated by the one-time password (OTP) method that will verify the real user by the unique password confirmation method after which the user will get the secret key on his/her e-mail ID.

Cite

CITATION STYLE

APA

Breezely George, M., & Igni Sabasti Prabu, S. (2016). Secured key sharing in cloud storage using elliptic curve cryptography. In Advances in Intelligent Systems and Computing (Vol. 398, pp. 21–30). Springer Verlag. https://doi.org/10.1007/978-81-322-2674-1_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free