Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments

Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments

Faiza Benmenzer, Rachid Beghdad
Copyright: © 2022 |Volume: 16 |Issue: 1 |Pages: 20
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781683180203|DOI: 10.4018/IJISP.307072
Cite Article Cite Article

MLA

Benmenzer, Faiza, and Rachid Beghdad. "Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments." IJISP vol.16, no.1 2022: pp.1-20. http://doi.org/10.4018/IJISP.307072

APA

Benmenzer, F. & Beghdad, R. (2022). Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments. International Journal of Information Security and Privacy (IJISP), 16(1), 1-20. http://doi.org/10.4018/IJISP.307072

Chicago

Benmenzer, Faiza, and Rachid Beghdad. "Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments," International Journal of Information Security and Privacy (IJISP) 16, no.1: 1-20. http://doi.org/10.4018/IJISP.307072

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Many encryption strategies have been applied to ensure data confidentiality and improve cloud security. The most recent cryptosystems are based on homomorphic (HE), attribute-based (ABE), and hybrid encryption. However, most of them suffer from numerous drawbacks: high time consumption, encrypted message size, and some vulnerabilities. Hence, a secure method is highly required to get a satisfying security level while keeping the computational complexity reduced. This paper outlines a novel technique that combines elliptic curve cryptography (ECC) and Blockchain technology. The data is first encoded using the Elliptic Curve Integrated Encryption Scheme, then signed using signed using the Elliptic Curve Digital Signature Algorithm, and finally confirmed by the blockchain network before being stored in the cloud. The performance evaluation results prove that the proposed system is highly resistant to man-in-the-middle and replay attacks and performs better than a set of existing solutions in terms of cryptography cost, encryption/decryption time, and algortithm complexity.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.