Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11847
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Waziri, Victor Onomza | - |
dc.contributor.author | Adebayo, Ojeniyi Joseph | - |
dc.contributor.author | Danladi, Hakimi | - |
dc.contributor.author | Isah, Audu | - |
dc.contributor.author | Magaji, Abubakar Sadiq | - |
dc.contributor.author | Abdullahi, Muhammad Bashir | - |
dc.date.accessioned | 2021-07-27T12:18:34Z | - |
dc.date.available | 2021-07-27T12:18:34Z | - |
dc.date.issued | 2013-11-27 | - |
dc.identifier.citation | Victor O. Waziri, Ojeniyi J. Adebayo, Hakimi Danladi, Audu Isah, Abubakar S. Magaji, and Muhammad Bashir Abdullahi. Network Security in Cloud Computing with Elliptic Curve Cryptography. Network and Communication Technologies, ISSN 1927-064X, E-ISSN 1927-0658, Vol. 2, No. 2, pp 43-58, 2013. | en_US |
dc.identifier.issn | ISSN 1927-064X | - |
dc.identifier.uri | http://dx.doi.org/10.5539/nct.v2n2p43 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/11847 | - |
dc.description.abstract | This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure simply focuses on the communication interaction of the Cloud providing communities and a pictured Smartphone user. The Elliptic Curve Cryptosystem is envisioned as the basic framework for data transmission security in the paper that proffers solution. We reviewed various literatures on the elliptic curves and applied the cyclic elliptic curve group based-on finite field modulo q. With the theory established, we applied the Elliptic Curve Digital Signature Algorithm as developed by ElGamal to carry out some exemplified computational sequences. The detail of the computational algorithm was done in Mathematica as given by (Jouko, 2011) with no modifications except in its translational interpretation to fit into cloud computing security environment as maybe applied by the cloud providing communities to accelerate and meeting the needs of the users on-demand as a service with embedding security consideration. Our contribution to the cloud computing environment is brought about through computational experimental activities as exemplified in this field for interactive security awareness through digital signature authenticating mechanism. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Canadian Center of Science and Education | en_US |
dc.relation.ispartofseries | Vol. 2, No;10.5539/nct.v2n2p43 | - |
dc.subject | Security | en_US |
dc.subject | Cloud Computing | en_US |
dc.subject | Standardization | en_US |
dc.subject | Authentication | en_US |
dc.subject | Elliptic Curve Digital Signature Algorithm | en_US |
dc.subject | Physical Security | en_US |
dc.title | Network Security in Cloud Computing with Elliptic Curve Cryptography | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Network Security in Cloud Computing with Elliptic Curve 2013.pdf | Main article | 326.03 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.