An Efficient Authentication Approach with Optimization Algorithms and Elliptical Curve Cryptography for Cloud Environment

Main Article Content

K. Shankar, M. Subhashini

Abstract

The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. Security is very important for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a dual optimizer based key generation method for the improving the authentication with Elliptical Curve Cryptography (ECC) encryption algorithm. The optimal private and secret key for the encryption and decryption are obtained with the optimization techniques like Animal Migration Optimization (AMO), and Brain Storm Optimization (BSO) for strengthening the security in the Cloud Computing environment.

Article Details

How to Cite
M. Subhashini, K. S. . (2023). An Efficient Authentication Approach with Optimization Algorithms and Elliptical Curve Cryptography for Cloud Environment. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 1049–1055. https://doi.org/10.17762/ijritcc.v11i9.8997
Section
Articles