Skip to main content

Rivest Cipher 4 Cryptography and Elliptical Curve Cryptography Techniques to Secure Data in Cloud

  • Conference paper
  • First Online:
Intelligent and Cloud Computing

Abstract

Data security is the major issue in the field of research and in the field of cloud computing; it is a major concern as data are located across the globe in the cloud. As cloud computing technology is used by government, businesses, and industries, many studies have been investigated recently to achieve authentication and the confidentiality of data while they are stored in the cloud. Cryptography plays an important role in achieving data security. The paper proposes a hybrid model that uses the symmetric RC4 algorithm to encrypt the data and the key performance encryption is secured by the ECC algorithm which is a public key algorithm. The proposed method provides high security by encrypting the session key and also needs less time for encrypting and decrypting the data than the existing model. The proposed hybrid model provides data confidentiality and also secures the session key used for encryption and decryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Rao, R.V., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48, 204–209 (2015)

    Article  Google Scholar 

  2. Khan, S., Shiraz, M., Boroumand, L., Gani, A., Khan, M.K.: Towards port knocking authentication methods for mobile cloud computing. J. Netw. Comput. Appl. 97, 66–78 (2017)

    Google Scholar 

  3. Fu, A., Li, Y., Yu, S., Yu, Y., Zhang, G.: DIPOR: an IDA-based dynamic proof of retrievability scheme for cloud storage systems. J. Netw. Comput. Appl. 104, 97–106 (2018)

    Google Scholar 

  4. He, Q., Zhang, N., Wei, Y., Zhang, Y.: Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems. Comput. Netw. In Press (2018)

    Google Scholar 

  5. Jung, K.D., Moon, S.J., Kim, J.M.: Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage. Multimed. Tools Appl. 76(19), 19983–19999 (2017)

    Google Scholar 

  6. Kadu, C.S., Jadhav, A.A., Mandale, P.L.: Improving security of cloud environment in dynamic cloud network. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5(2), 1681–1684 (2014)

    Google Scholar 

  7. Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)

    Article  MathSciNet  Google Scholar 

  8. Abd Elminaam, D.S.: Improving the security of cloud computing by building new hybrid cryptography algorithms. Int. J. Electron. Inf. Eng. 8(1), 40–48 (2018)

    Google Scholar 

  9. Barvekar, R., Behere, S., Pounikar, Y., Gulhane, A.: An approach to hybrid cryptography on cloud environment. IJARIIE, 4(2), 4626–4631 (2018)

    Google Scholar 

  10. Purevjav, S., Kim, K.H., Sain, M., Lee, H.: Design of hybrid cryptosystem for cloud system. In: IEEE Conference on Wireless Sensors (ICWiSe), pp. 67–70 (2015)

    Google Scholar 

  11. Shereek, B.M., Muda, Z., Yasin, S.: Improve cloud computing security using RSA encryption with Fermat’s little theorem. IOSR J. Comput. Eng. (IOSR-JCE) 4(2), 1–8 (2014)

    Google Scholar 

  12. Sengupta, N.: Designing of hybrid RSA encryption algorithm for cloud security. Int. J. Innov. Res. Comput. Commun. Eng. 3(5), pp. 4146–4152 (2015)

    Google Scholar 

  13. Najar, J.M., Dar, S.B.: A new design of a hybrid encryption algorithm. Int. J. Eng. Comput. Sci. 3(11), 9169–9171 (2014)

    Google Scholar 

  14. Timothy, D.P., Santra, A.K.: A hybrid cryptography algorithm for cloud computing security. In: International Conference on Microelectronic Devices, Circuits and Systems (ICMDCS), pp. 1–5. IEEE (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alok Ranjan Tripathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tripathy, A., Tripathy, A.R., Rath, S., Jena, O.P., Swagatika, S. (2021). Rivest Cipher 4 Cryptography and Elliptical Curve Cryptography Techniques to Secure Data in Cloud. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds) Intelligent and Cloud Computing. Smart Innovation, Systems and Technologies, vol 194. Springer, Singapore. https://doi.org/10.1007/978-981-15-5971-6_69

Download citation

Publish with us

Policies and ethics