Enhancing Security in Cloud Storage using ECC Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135 | Views: 336

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013 | Popularity: 6.2 / 10


     

Enhancing Security in Cloud Storage using ECC Algorithm

Ravi Gharshi, Suresha


Abstract: Security in cloud computing is an evolving area in todays world. It is subject of concern for Cloud Technology Services. One of the measures which customers can take care of is to encrypt their data before it is stored on the cloud. This work is intended towards providing security service such as confidentiality in the cloud services can use Elliptic Curve Cryptography (ECC) algorithm instead of familiar and generalized RSA for data encryption because of its advantages in terms of smaller key sizes, lower CPU time and less memory usage.


Keywords: Security, Elliptic Curve Cryptography, RSA, Key Size and Cloud Technology


Edition: Volume 2 Issue 7, July 2013


Pages: 59 - 64



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Ravi Gharshi, Suresha, "Enhancing Security in Cloud Storage using ECC Algorithm", International Journal of Science and Research (IJSR), Volume 2 Issue 7, July 2013, pp. 59-64, https://www.ijsr.net/getabstract.php?paperid=0201374, DOI: https://www.doi.org/10.21275/0201374

Similar Articles

Downloads: 6 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 642 - 647

Face Liveness to Identify Between Actual Face and Spoof Face

Lovely Pal, Renuka Singh

Share this Article
Top