Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/124283
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2017-01-03T09:06:59Z | - |
dc.date.available | 2017-01-03T09:06:59Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/124283 | - |
dc.description.abstract | Cloud computing has become more popular everywhere in the conceptual sphere as it is a sort of high performance computing technique. Like grid computing, cloud computing is also a paradigm of resource sharing, which bestows third party and is a wide and collective distributed computing. For the past few years, cloud computing is one among the top ten booming technologies, which proves a substantial impact on the field of information technology. Due to the vast growth of cloud computing, security becomes critical issue both to address and explore. The proposed security model should occupy lesser memory space. Smaller sizes of security keys are much preferred for encryption algorithm newline newlineThe security of the cloud computing differs from typical wired and wireless network security, because the user or the provider is a third party to each other and also a user may share a same cloud to many users at different levels. A secured cloud has become an important area of research due to its variety of customers, devices used for access, variant parameters and metrics involved. In the design of secured cloud, if modern hand held devices are accessed by the cloud then, smaller sizes of security keys are much preferred for the encryption algorithm. Now a days clouds are accessed by many users through their mobile and hand held devices. newline newlineIn the recent public key cryptography, factors decomposition problems based on large numbers are commonly used, for example, Rivest-Shamir-Adleman (RSA) algorithm. Till date, RSA become most widely used and supported public key encryption scheme. Few investigators improved the performance of RSA using Chinese Remainder Theorem. Even though, it is still a question for those newline newline newlineapproaching the clouds using their hand held systems in terms of processing time, memory and bandwidth. Elliptic Curve Cryptography (ECC) will act as an alternative to traditional public key cryptographic systems. Even though, RSA was the most prominent cryptographic scheme, it is being replaced by ECC in many systems. newline newlineIn Elliptic curve based algorithms, elliptic curve point multiplication is the most computationally intensive operations. Therefore, implementing point multiplication by various hardware means makes ECC more captivating for high performance servers and small devices. The memory occupancies are less in ECC but implementation of ECC becomes difficult as it requires more time to analyze. newline newlineTherefore, Hybrid Elliptic Curve Cryptography (HECC) is proposed for optimizing memory occupancy and smooth functionalities. The proposed secured cloud model has two components namely 1) Hybrid ECC and 2) ACO based Security Model. HECC is used for Encryption and ACO is used for key management newline newlineThe proposed security model focusses on two major aspects, which are encrypting the data for data security and providing intrusion detection system. The main focus of HECC is less execution time and less key size. The proposed system provides secured environment to the cloud computing. Handheld devices which are approaching the cloud environment will be able to use the proposed system effectively. newline | |
dc.format.extent | ||
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | HYBRID ELLIPTICAL CURVE CRYPTOGRAPHY BASED SECURED CLOUD USING MOBILE ANT AGENT | |
dc.title.alternative | ||
dc.creator.researcher | M. HEMANTH CHAKRAVARTHY | |
dc.description.note | ||
dc.contributor.guide | E.KANNAN | |
dc.publisher.place | Chennai | |
dc.publisher.university | Vel Tech Dr. R R and Dr. S R Technical University | |
dc.publisher.institution | Department of Computer Science and Engineering | |
dc.date.registered | 29-6-2009 | |
dc.date.completed | 02/12/2016 | |
dc.date.awarded | 02/12/2016 | |
dc.format.dimensions | ||
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
abstract.pdf | Attached File | 83.5 kB | Adobe PDF | View/Open |
aknowledgement.pdf | 86.36 kB | Adobe PDF | View/Open | |
bibliography.pdf | 81.13 kB | Adobe PDF | View/Open | |
certificates.pdf | 237.68 kB | Adobe PDF | View/Open | |
chapter iii.pdf | 535.86 kB | Adobe PDF | View/Open | |
chapter ii.pdf | 204.21 kB | Adobe PDF | View/Open | |
chapter i.pdf | 476.83 kB | Adobe PDF | View/Open | |
chapter iv.pdf | 742.13 kB | Adobe PDF | View/Open | |
chapter vii.pdf | 84.91 kB | Adobe PDF | View/Open | |
chapter vi.pdf | 884.15 kB | Adobe PDF | View/Open | |
chapter v.pdf | 513.8 kB | Adobe PDF | View/Open | |
contents.pdf | 127.71 kB | Adobe PDF | View/Open | |
publications.pdf | 142.74 kB | Adobe PDF | View/Open | |
references.pdf | 199.11 kB | Adobe PDF | View/Open | |
title.pdf | 104.14 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: