Data Security in Cloud Computing with Elliptic Curve Cryptography


  • Abdulkadir Abdullahi Ibrahim School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology Kenya
  • Dr. Wilson Cheruiyot School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology Kenya
  • Dr. Michael W. Kimwele School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology Kenya


cloud computing, Data security, Hashing, Digital Signature, ECC algorithm.


Cloud Computing (CC) is one of the most important and hottest deal of attention, both in academia researches and among users, due to its ability for satisfying the computing needs by reducing commercial expenditure bandwidth with computing compounds while increasing scalability and flexibility for computing services, accessing it through an Internet connection from anywhere in the world its available Internet network..However it becomes particularly serious because the data is located in different places even in the entire globe and should be taken into account such as violation of the confidentiality and privacy of customers’ data via unauthorized parties. So the only causes imperfection in the cloud computing is security impairment generally and especially data security. Despite about organizations and individual user adopting cloud computing, put their data in cloud due to the security issues challenges associated with it requires that organizations trust needs a technical tools protecting their data. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. Hence, we proposed data security in cloud computing with elliptic curve cryptography a proficient data security model algorithm, as a secure tool to model a Secured platform for Data in cloud computing. The algorithm was simulated using Java Development Kit (JDK) to implement the curve operations to extract the data in the Cloud, encrypting, decrypting, signing and verifications the signature, followed by testing the acquired results the implemented classes and their design Although this topic represent a good sample of the work that is being done, there are many requirements to study this area due to the needs of cloud computing in the next generation both individuals and organization even governmental agencies Might parallel increase of cyber attackers and they improve their techniques so as a researcher suggest the importance of data in ECC to be studied.


L. Kleinrock, “A Vision for the Internet”, ST Journal of Research, 2(1):4-5, Nov, 2005.

Mell, Peter, and Timothy Grance, "The NIST definition of cloud computing (draft)," NIST special publication vol.800, 2011.pp 145.

P. Siani. "Privacy, security and trust in cloud computing." Privacy and Security for Cloud Computing. Springer London, 2013. pp3-42.

H.Jian, Z. . “Analysis and Application of Consumer Features with Cloud Computing and Data Mining Technology.” In Intelligent Computation Technology and Automation, 7th International Conference ICICTA, Oct 2014 ,pp. 84-87.


D.Sajal K and K. Krishna and Z.Nan . Handbook on securing cyber-physical critical infrastructure. Elsevier, 2012.PP.392-394.

Y.Huiming, et al. "Cloud computing and security challenges." Proceedings of the 50th Annual Southeast Regional Conference. ACM, 2012. pp. 298-302.

S .Bulusu and K. Sudia . “A Study on Cloud Computing Security Challenges.” M.Sc. thesis, Blekinge Institute of Technology, Sweden, 2012.

S.Subashini, and K.Veeraruna. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications, Vol.34.pp. 1-11, Jan. 2011.

K.Parsi, and S.Singaraju. "Data security in cloud computing using RSA algorithm." .IJRCCT,vol. 1. pp143-146,apr.2012.

V.Rajasekaran and M. Suganya. "An Analysis of SPI Security Issues for Cloud Computing." Biometrics and Bioinformatics ,vol5,pp 425, dec.2013.

G.Sagayee, and M. Anandha . "Biometric encryption using enhanced finger print image and elliptic curve." International Journal of Electronic Security and Digital Forensics, vol.2 5. pp. 110-123, feb.2013.

A. Yasser.” Implementation of Elliptic Curve Cryptography using biometric features to enhance security services”. Diss. University of Malaya, 2009.




How to Cite

Ibrahim, A. A., Cheruiyot, D. W., & W. Kimwele, D. M. (2017). Data Security in Cloud Computing with Elliptic Curve Cryptography. International Journal of Computer (IJC), 26(1), 1–14. Retrieved from