Header menu link for other important links
X
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
Thiyagarajan D,
Published in International Journal of Technology
2015
Volume: 6
   
Issue: 3
Pages: 327 - 335
Abstract
Data owners use the huge space offered by 'Cloud' Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud. © IJTech 2015.
About the journal
JournalInternational Journal of Technology
PublisherInternational Journal of Technology
ISSN2086-9614
Open Access0