Title: Securing utility computing using enhanced elliptic curve cryptography and attribute-based access control policy

Authors: Saira Varghese; S. Maria Celestin Vigila

Addresses: Department of Computer Science & Engineering, Toc H Institute of Science & Technology, Cochin, Kerala, India ' Department of Information Technology, Noorul Islam Centre for Higher Education, Kumaracoil, Tamil Nadu, India

Abstract: This paper proposes a data security model for utility computing that integrates securely mapped plain text using Elliptic Curve Cryptography (ECC) without certified keys, attribute-based access control using Reduced Ordered Binary Decision Diagram (ROBDD), cryptographically secure 256 bit pseudorandom numbers and fingerprint security. ECC uses standard elliptic curves of large prime and ROBDD is built with positive and negative attributes of data users and 256 bit pseudorandom secrets along its path. Secret key that is generated based on the attributes along the valid path of the policy enhances the security. The proposed model allows secure key exchange by making use of the property of elliptic curve to convert numbers to points and secure data storage by associating authenticated secrets of end users with the original secret key is beneficial in decentralised architecture. The result reveals that proposed model achieved high security and less space and time complexity for securing cloud data.

Keywords: secure utility computing; ROBDD; reduced ordered binary decision diagram; ECC; elliptic curve cryptography; attribute-based access control; cryptographically secure pseudorandom numbers.

DOI: 10.1504/IJGUC.2022.125140

International Journal of Grid and Utility Computing, 2022 Vol.13 No.4, pp.394 - 405

Received: 12 Sep 2020
Accepted: 04 Feb 2021

Published online: 31 Aug 2022 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article