What is it about?

The transmission of various facilities and services via the network is known as cloud computing. They involve data storage, data centers, networks, internet, and software applications, among other systems and features. Cryptography is a technique in which plain text is converted into cipher-text to preserve information security. It basically consists of encryption and decryption. The level of safety is determined by the category of encryption and decryption technique employed. The key plays an important part in the encryption method. If the key is leaked, anyone can intrude into the data and there is no use of this encryption. When the data is lost and the server fails to deliver it to the user, then it is to be recovered from any of the backup server using a recovery technique. The main objective is to develop an advanced method to increase the scope for data protection in cloud. Elliptic Curve Cryptography is a relatively new approach in the area of cryptography. The degree of security provides higher as compared to other Cryptographic techniques. The raw data and it’s accompanying as CII characters are combined and sent into the Elliptic Curve Cryptography as a source. This method eliminates the need for the transmitter and recipient to have a similar search database. Finally, a plain text is converted into cipher-text using Elliptic Curve Cryptography. The results are oat aimed by implementing a C program for Elliptic Curve Cryptography. Encryption, decryption and recovery using suitable algorithms are done.

Featured Image

Why is it important?

The adoption of Elliptic Curve Cryptography represents a significant step forward in securing cloud-based services and data. ECC is known for offering a high level of security with relatively smaller key sizes compared to traditional methods like RSA, making it more efficient in terms of computational resources and response time. By converting plain text into cipher-text, ECC ensures the confidentiality and integrity of data transmitted over the network. This is crucial for sensitive information and business-critical applications hosted on cloud platforms.

Perspectives

The primary objective of employing ECC in cloud computing is to fortify data protection, ensuring that sensitive information remains confidential and secure from unauthorized access. This is particularly important in an era where data breaches and cyber-attacks are increasingly common. The passage highlights the crucial role of key management in encryption. ECC's strength lies in its ability to provide high security with relatively smaller key sizes, which simplifies key management processes and reduces the risk of key leakage.

Balajee Maram
SR University

Read the Original

This page is a summary of: Data Security And Recovery Approach Using Elliptic Curve Cryptography, December 2021, Institute of Electrical & Electronics Engineers (IEEE),
DOI: 10.1109/csitss54238.2021.9683473.
You can read the full text:

Read

Contributors

The following have contributed to this page