A Systematic Literature Review of the Elliptic Curve Cryptography (ECC) Algorithm for Encrypting Data Sharing in Cloud Computing

Authors

  • Poovendran Alagarsundaram Humetis Technologies Inc, Kingston, NJ, USA Author

Keywords:

Cloud computing, data encryption, elliptic curve cryptography (ECC), computational efficiency, resource utilization, data security.

Abstract

Cloud computing has transformed the information technology environment by
allowing users to share resources, services, and data across a network. Despite its
various benefits, such as scalability, flexibility, and cost-effectiveness, cloud
computing raises serious security concerns, notably about data confidentiality and
integrity during transmission. Traditional encryption approaches, such as the
Advanced Encryption Standard (AES), have helped to secure data, but their
limitations in computing efficiency and resource consumption compel the
exploration of other ways. This research conducts a comprehensive literature review
on Elliptic Curve Cryptography (ECC), an effective encryption technology for
safeguarding data sharing in cloud computing. ECC is known for its strong security,
reduced key sizes, and faster processing, making it an excellent choice for cloud
environments. The work investigates the mathematical foundations of ECC, such as
point addition and point doubling, and proposes a systematic approach to ECC-based
encryption and decryption. Furthermore, it compares ECC's performance and
security to AES, emphasizing ECC's advantages in resource utilization and
computational efficiency. The findings indicate that ECC can greatly improve data
security in cloud computing while optimizing resource efficiency, resulting in a
scalable and cost-effective solution for modern data encryption requirements.

Downloads

Published

2023-04-24

Issue

Section

Articles

How to Cite

A Systematic Literature Review of the Elliptic Curve Cryptography (ECC) Algorithm for Encrypting Data Sharing in Cloud Computing. (2023). International Journal of Engineering and Science Research, 13(2), 1-16. https://www.ijesr.org/index.php/ijesr/article/view/976

Similar Articles

21-30 of 563

You may also start an advanced similarity search for this article.