Securing utility computing using enhanced elliptic curve cryptography and attribute-based access control policy Online publication date: Wed, 31-Aug-2022
by Saira Varghese; S. Maria Celestin Vigila
International Journal of Grid and Utility Computing (IJGUC), Vol. 13, No. 4, 2022
Abstract: This paper proposes a data security model for utility computing that integrates securely mapped plain text using Elliptic Curve Cryptography (ECC) without certified keys, attribute-based access control using Reduced Ordered Binary Decision Diagram (ROBDD), cryptographically secure 256 bit pseudorandom numbers and fingerprint security. ECC uses standard elliptic curves of large prime and ROBDD is built with positive and negative attributes of data users and 256 bit pseudorandom secrets along its path. Secret key that is generated based on the attributes along the valid path of the policy enhances the security. The proposed model allows secure key exchange by making use of the property of elliptic curve to convert numbers to points and secure data storage by associating authenticated secrets of end users with the original secret key is beneficial in decentralised architecture. The result reveals that proposed model achieved high security and less space and time complexity for securing cloud data.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Grid and Utility Computing (IJGUC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com