Revolutioning Cloud Data Security with Elliptic Curve Cryptography
Revolutioning Cloud Data Security with Elliptic Curve Cryptography
N. ANITHA , K KUSUMA , PACCHA UDAYALAKSHMI , G R VENKAT , A S DEENADAYALAN
1,2,3,4,5,6 Computer Science and Information Technology, Siddharth Institute of Engineering & Technology
Abstract - In the era of cloud computing, ensuring data security and efficient data retrieval is paramount. This paper presents an Efficient Traceable Authorization Search System for Cloud Storage that implements a robust authorization mechanism allowing only authorized users to perform searches on cloud-stored data. Authorized users are classified into two categories: role-based users such as data owners and their delegates, and attribute-based users such as specific departments within an organization.The project emphasizes advanced cryptographictechniques to enhance data security within cloud environments. Existing systems primarily use RSA cryptography, which has notable limitations insecurity and efficiency. To overcome these challenges, we propose the integration of Elliptic Curve Cryptography (ECC). Keywords: Authorization Search, Role-Based AccessControl (RBAC), Attribute-Based Access Control (ABAC), Cryptography, Elliptic Curve Cryptography (ECC).