Title | Data Security And Recovery Approach Using Elliptic Curve Cryptography |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Srinadh, V, Maram, Balajee, Daniya, T. |
Conference Name | 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) |
Keywords | cloud computing, composability, cryptography, decryption, Elliptic curve cryptography, Elliptic curves, Encryption, Metrics, pubcrawl, Public key, recovery, resilience, Resiliency, Scalability, Software, Transmitters |
Abstract | The transmission of various facilities and services via the network is known as cloud computing. They involve data storage, data centers, networks, internet, and software applications, among other systems and features. Cryptography is a technique in which plain text is converted into cipher-text to preserve information security. It basically consists of encryption and decryption. The level of safety is determined by the category of encryption and decryption technique employed. The key plays an important part in the encryption method. If the key is leaked, anyone can intrude into the data and there is no use of this encryption. When the data is lost and the server fails to deliver it to the user, then it is to be recovered from any of the backup server using a recovery technique. The main objective is to develop an advanced method to increase the scope for data protection in cloud. Elliptic Curve Cryptography is a relatively new approach in the area of cryptography. The degree of security provides higher as compared to other Cryptographic techniques. The raw data and it's accompanying as CII characters are combined and sent into the Elliptic Curve Cryptography as a source. This method eliminates the need for the transmitter and recipient to have a similar search database. Finally, a plain text is converted into cipher-text using Elliptic Curve Cryptography. The results are oat aimed by implementing a C program for Elliptic Curve Cryptography. Encryption, decryption and recovery using suitable algorithms are done. |
DOI | 10.1109/CSITSS54238.2021.9683473 |
Citation Key | srinadh_data_2021 |