International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 117 121 _______________________________________________________________________________________________ 117 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Application of Elliptical Curve Cryptography in Empowering Cloud Data Security T. Venkat Narayana Rao 1 Professor, Dept. of Computer Science and Engineering Sreenidhi Institute of Science and Technology Hyderabad, India Vanaparthy Sai Praneeth 2 Student, Dept. of Computer Science and Engineering Sreenidhi Institute of Science and Technology Hyderabad, India K. Sai Sharath 3 Student, Dept. of Computer Science and Engineering Sreenidhi Institute of Science and Technology Hyderabad, India. Abstract: Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography. The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give access to the encryption keys stored in cloud. Keywords: Cloud Computing, Data security, Cloud security, Encryption, Decryption, Elliptical Curve Cryptography, Digital signature, Elliptic Curve Theory. __________________________________________________*****_________________________________________________ I. INTRODUCTION Cloud is basically a combination of servers at very high level. Cloud computing allows us to access the internet applications and services over internet. It allows us to create, configure and customize online applications. Cloud computing refers to accessing and making use of the hardware and software resources remotely. It provides online data storage of data. Cloud computing enables executing application directly on the cloud without being application to be installed on the local machine as shown in figure 1. This paper focus on the data security and cloud protection inside the cloud processing that can be attained by the application of cryptographic algorithms. Fig 1: Cloud Computing A. CRYPTOGRAPHY Cryptography is the discipline or art of changing the text to an encoded form that makes text ineligible for those who need not read. This process of plaintext conversion using a mechanism known as encryption. Decryption is to re- conversion of cipher text back plaintext. In a private key cryptography process, the encryption and decryption are performed using a alike key which is secret key. The popular examples are AES and DES algorithms. Public key cryptography is also called as asymmetric key cryptographic systems. A key is basically a value used in a cryptography algorithm to translate raw text to cipher text. This has great value and is measured in several parts. It is observed that the more the key size used in the public key cryptography, the more the secure the cryptographic mechanism would be. B. DATA SECURITY To produce data, most systems employ a combination of methods, that includes: 1. Encryption means using a complex expression to encode the data. In order to decode the encrypted data files, a user requires an encryption key. While a user can obtain a cipher text but it is in illegible format in order to decrypt the cipher text any user