Data Security in Cloud Computing with Elliptic Curve Cryptography

Abdulkadir Abdullahi Ibrahim, Dr. Wilson Cheruiyot, Dr. Michael W. Kimwele


Cloud Computing (CC) is one of the most important and hottest deal of attention, both in academia researches and among users, due to its ability for satisfying the computing needs by reducing commercial expenditure bandwidth with computing compounds while increasing scalability and flexibility for computing services, accessing it through an Internet connection from anywhere in the world its available Internet network..However it becomes particularly serious because the data is located in different places even in the entire globe and should be taken into account such as violation of the confidentiality and privacy of customers’ data via unauthorized parties. So the only causes imperfection in the cloud computing is security impairment generally and especially data security. Despite about organizations and individual user adopting cloud computing, put their data in cloud due to the security issues challenges associated with it requires that organizations trust needs a technical tools protecting their data. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. Hence, we proposed data security in cloud computing with elliptic curve cryptography a proficient data security model algorithm, as a secure tool to model a Secured platform for Data in cloud computing. The algorithm was simulated using Java Development Kit (JDK) to implement the curve operations to extract the data in the Cloud, encrypting, decrypting, signing and verifications the signature, followed by testing the acquired results the implemented classes and their design Although this topic represent a good sample of the work that is being done, there are many requirements to study this area due to the needs of cloud computing in the next generation both individuals and organization even governmental agencies Might parallel increase of cyber attackers and they improve their techniques so as a researcher suggest the importance of data in ECC to be studied.


cloud computing; Data security; Hashing; Digital Signature; ECC algorithm.

Full Text:



L. Kleinrock, “A Vision for the Internet”, ST Journal of Research, 2(1):4-5, Nov, 2005.

Mell, Peter, and Timothy Grance, "The NIST definition of cloud computing (draft)," NIST special publication vol.800, 2011.pp 145.

P. Siani. "Privacy, security and trust in cloud computing." Privacy and Security for Cloud Computing. Springer London, 2013. pp3-42.

H.Jian, Z. . “Analysis and Application of Consumer Features with Cloud Computing and Data Mining Technology.” In Intelligent Computation Technology and Automation, 7th International Conference ICICTA, Oct 2014 ,pp. 84-87.


D.Sajal K and K. Krishna and Z.Nan . Handbook on securing cyber-physical critical infrastructure. Elsevier, 2012.PP.392-394.

Y.Huiming, et al. "Cloud computing and security challenges." Proceedings of the 50th Annual Southeast Regional Conference. ACM, 2012. pp. 298-302.

S .Bulusu and K. Sudia . “A Study on Cloud Computing Security Challenges.” M.Sc. thesis, Blekinge Institute of Technology, Sweden, 2012.

S.Subashini, and K.Veeraruna. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications, Vol.34.pp. 1-11, Jan. 2011.

K.Parsi, and S.Singaraju. "Data security in cloud computing using RSA algorithm." .IJRCCT,vol. 1. pp143-146,apr.2012.

V.Rajasekaran and M. Suganya. "An Analysis of SPI Security Issues for Cloud Computing." Biometrics and Bioinformatics ,vol5,pp 425, dec.2013.

G.Sagayee, and M. Anandha . "Biometric encryption using enhanced finger print image and elliptic curve." International Journal of Electronic Security and Digital Forensics, vol.2 5. pp. 110-123, feb.2013.

A. Yasser.” Implementation of Elliptic Curve Cryptography using biometric features to enhance security services”. Diss. University of Malaya, 2009.


  • There are currently no refbacks.

Comments on this article

View all comments





About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).