International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 143

Research Paper | Mathematics | India | Volume 4 Issue 2, February 2015


An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing

Nasheem Khan | Vinod Kumar [35] | Adesh Kumari [2]


Abstract: Cloud Computing with Elliptic Curve Cryptography (ECC) is an entirely novel area and has inconceivable scope of research. It is a talented saleable infrastructure archetype that promises to exterminate require for maintaining exclusive computing amenities by companies and institutes comparable. It has obsessed insubstantial, technical, economic, and client experience characteristics. All through the use of virtualization and resource time allocation, clouds provide with a testing position of physical resources a gargantuan client base with dissimilar requirements. However, a user uses public network for the duration of right of entry of cloud services at the same time an adversary knows how to get full control over the public network. Therefore, a user ought to advocate a mechanism in which user and server can authenticate each other and generate a safe session. In this projected protocol, user and server established a session key and can communicate securely through the public network. This recently protocol decreases the cost of computation deeply and compared with previous existing protocol. Detailed network security investigations have been made to authenticate the proficiency of the protocol. Additional, this protocol has the argument to likely attacks in cloud computing.


Keywords: Cloud Computing, Elliptic Curve Cryptography, Pairing-free Identity based Cryptosystem, Authentication, Private Key Generator and Security


Edition: Volume 4 Issue 2, February 2015,


Pages: 605 - 608


How to Cite this Article?

Nasheem Khan, Vinod Kumar, Adesh Kumari, "An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 605-608, https://www.ijsr.net/get_abstract.php?paper_id=SUB151166

How to Share this Article?







Similar Articles with Keyword 'Authentication'

Downloads: 6 | Weekly Hits: ⮙2 | Monthly Hits: ⮙6

Research Paper, Mathematics, Uganda, Volume 11 Issue 11, November 2022

Pages: 448 - 455

The P vs NP or P = NP Conjecture

Adriko Bosco [5]

Share this Article

Downloads: 108

Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014

Pages: 587 - 589

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar [35] | Adesh Kumari [2]

Share this Article


Top