当前位置: X-MOL 学术IET Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach
IET Communications ( IF 1.5 ) Pub Date : 2020-11-17 , DOI: 10.1049/iet-com.2020.0255
Pawan Kumar 1 , Ashutosh Kumar Bhatt 2
Affiliation  

In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data encryption, and data decryption due to its minimum key size. The proposed ECC-based authentication approach allows the authorised person to access private data; it protects different related attacks effectively. To develop more secure data encryption, the authors have combined a nature-inspired optimisation, such as a moth search algorithm (MSA) with ECC, to select the correct and optimal value of the elliptic curve. The proposed encryption and decryption approach combines DNA encoding with the ECC encryption algorithm. The mechanism of DNA encoded ECC provided multi-level security with less computational power. The security analysis of the proposed method has been provided to prove its effectiveness against certain attacks, such as denial-of-service attack, impersonation attack, reply attack, plaintext attack and chosen-ciphertext attack. The experimental result is evaluated based on encryption time, decryption time, throughput and key size of the security model. The average execution time of the proposed encryption and decryption is only 83.153 and 86.076 s, respectively. From the evaluation, it is clearly determined that the proposed technique provides two-layer security with minimum key size and less storage space.

中文翻译:

使用基于ECC的混合数据加密方法增强云计算中的多租户安全性

在这项研究中,由于其最小的密钥大小,因此选择了椭圆曲线密码术(ECC)进行房客身份验证,数据加密和数据解密。提出的基于ECC的身份验证方法允许授权人访问私有数据;它有效地保护了各种相关的攻击。为了开发更安全的数据加密,作者结合了自然界的优化技术,例如采用ECC的飞蛾搜索算法(MSA),以选择正确和最佳的椭圆曲线值。所提出的加密和解密方法将DNA编码与ECC加密算法结合在一起。DNA编码ECC的机制以较少的计算能力提供了多级安全性。提供了该方法的安全性分析,以证明其针对某些攻击(例如拒绝服务攻击,模拟攻击,回复攻击,明文攻击和选择密文攻击。根据安全模型的加密时间,解密时间,吞吐量和密钥大小评估实验结果。提议的加密和解密的平均执行时间分别仅为83.153和86.076 s。通过评估,可以清楚地确定所提出的技术提供了具有最小密钥大小和更少存储空间的两层安全性。
更新日期:2020-11-21
down
wechat
bug