OB-MECC: An Efficient Confidentiality and Security Enhancement for Cloud Storage System

  • P. NagaRaju Research Scholar, ANU College of Engineering and Technology, Gunture, A.P., India and Assistant Professor, Department of CSE, GMRIT, Rajam, Srikakulam, AP, India https://orcid.org/0000-0001-8318-8325
  • N. Nagamalleswara Rao Professor, Dept. of IT, RVR & JC College of Engineering, Guntur, AP, India
Keywords: Data confidentiality, data Security, obfuscation (OB), data encryption, data decryption, elliptical curve cryptography (ECC), modified ECC (MECC)


Cloud computing (CC) is one amongst the developing technologies, which get more attention from academia as well as industries. It offers diverse benefits like sharing computing resources, service flexibility, reducing costs, etc. The Cloud Services Provider (CSP) is accountable for the data that are delivered to the cloud. The threat of seeing the stored data and using sensitive raw data by strangers is the main barrier in the utilization of cloud services. So, Data Security (DS) along with privacy is the chief issue, which is an obstacle while adopting the CC. Countless techniques are existent for ensuring data confidentiality, but they do not completely give protection to the data. To trounce these drawbacks, this paper introduces the Obfuscation (OB) based Modified Elliptical Curve Cryptography (MECC) algorithm for protecting data as of malicious attacks, which is termed as OB-MECC. Primarily, the proposed method obfuscates the data before they are uploaded to the cloud. For the OB of the data, the proposed work employs methods like substitution cipher (SC), position update, Ceaser cipher, binary conversion, 8-bit binary conversion, decimal(),  two complex(), and ASCII(). Then, encryption of the obfuscated data is done with the utilization of the MECC algorithm. After encryption, the data on the cloud is retrieved. The retrieved data is then decrypted by reversing the OB and encryption process to get the actual data. The outcomes corroborate that the confidentiality and security level are maximum for the proposed OB-MECC when contrasted to the existing approaches.


Download data is not yet available.

Author Biographies

P. NagaRaju, Research Scholar, ANU College of Engineering and Technology, Gunture, A.P., India and Assistant Professor, Department of CSE, GMRIT, Rajam, Srikakulam, AP, India

P. Nagaraju received his Bachelor of Technology from JNT University in 2007 and Master of Technology from Andhra University in year 2009. He is currently pursuing Ph.D. and currently working as Assistant Professor in Department of Computational Science, GMR Institute of Technology, Rajam since 2012. He has published more than 5 research papers in reputed international journals. His main research work focuses on Cryptography Algorithms, Network Security, Cloud Security and Privacy, Big Data Analytics, IoT and Computational Intelligence based education. He has 11 years of teaching experience and 5 years of Research Experience.

N. Nagamalleswara Rao, Professor, Dept. of IT, RVR & JC College of Engineering, Guntur, AP, India

N. Nagamalleswara Rao received his B.Tech degree in Computer Science and Engineering in 1991 and M.E. degree in CSE in 1993. He is in the teaching field since January 1993. He is currently working as Professor in Department of Information Technology, RVR&JC College of engineering, Guntur since 2012. He completed his Doctorate degree in 2000. His area of specialization is Computer Algorithms, Compilers, Image Processing. He has more than 30 International publications in Journals and fifteen papers in International Conferences to his credit. He is a Senior Member of IEEE. He has 25 years of teaching experience and 20 years of Research Experience.


George Amalarathinam DI, “Security Enhancement for Public Cloud Storage”, International Journal of Pure and Applied Mathematics, vol. 118, no. 6, pp. 1–9, 2018.

Khalid EL Makkaoui, Abdellah Ezzati, Abderrahim Beni-Hssane, Cina Motamed, “Data confidentiality in the world of cloud”, Journal of Theoretical and Applied Information Technology, vol. 84, no. 3, 2016.

Vithya Vijayalakshmi A, Veeraragavan N and Arockiam L, “A unified model for cloud data confidentiality”, Asian Journal of Science and Applied Technology, vol. 7, no. 1, pp. 23–27, 2018.

Kelsey Rauber, “Cloud cryptography”, International Journal of Pure and Applied Mathematics, Vol. 85, pp. 1–11, 2013

Silki Jain, Abhilasha Vyas, “An Improved Security Framework for Cloud Environment using ECC algorithm”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol. 6, 2018.

Sulochana M and Ojaswani Dubey, “Preserving data confidentiality using multi-cloud architecture”, Procedia Computer Science, vol. 50, pp. 357–362, 2015.

Manpreet Kaur and Rajbir Singh, “Implementing encryption algorithms to enhance data security of cloud in cloud computing”, International Journal of Computer Applications, vol. 70, no. 18, 2013.

Yang Geng, “Homomorphic encryption technology for cloud computing”, Procedia Computer Science, vol. 154, pp. 73–83, 2019.

Arockiam D L and Monikandan S, “A security service algorithm to ensure the confidentiality of data in cloud storage”, Int J Eng Res Technol (IJERT), vol. 3, no. 12, pp. 1053–1058, 2014.

Yue Shi, “Data security and privacy protection in public cloud”, In IEEE International Conference on Big Data (Big Data), pp. 4812–4819, IEEE, 2018.

Arul Oli S, Arockiam L, “Confidentiality technique for enhancing data security using encryption and obfuscation in public cloud storage”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no. 2, 2016.

Ghassan Sabeeh Mahmood, Dong Jun Huang, and Baidaa Abdulrahman Jaleel, “Achieving an effective, confidentiality and integrity of data in cloud computing”, IJ Network Security, vol. 21, no. 2, pp. 326–332, 2019.

Arockiam L, Monikandan S, Sheba K Malarchelvi P D, “Obfuscrypt: A novel confidentiality technique for cloud storaWge”, International Journal of Computer Applications, vol. 88, pp. 17–21, 2014.

Nasarul Islam K V, Mohamed Riyas K V, “Analysis of various encryption algorithms in cloud computing”, International Journal of Computer Science and Mobile Computing, IJCSMC, vol. 6, no. 7, pp. 90–97, 2017.

Arul Oli S, and Arockiam L, “Confidentiality technique to obfuscate the numerical data to enhance security in public cloud storage”, In International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), pp. 1–6, IEEE, 2017.

Fathima Mary B, and DI George Amalarethinam, “Data security enhancement in public cloud storage using data obfuscation and steganography”, In World Congress on Computing and Communication Technologies (WCCCT), pp. 181–184, IEEE, 2017.

Miranda Mowbray, Siani Pearson, and Yun Shen, “Enhancing privacy in cloud computing via policy-based obfuscation”, The Journal of Supercomputing, vol. 61, no. 2, pp. 267–291, 2012.

Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, and Fagen Li, “An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid”, Journal of Systems Architecture, vol. 98, pp. 165–172, 2019.

Neela K L, and Kavitha V, “Enhancement of data confidentiality and secure data transaction in cloud storage environment”, Cluster Computing, vol. 21, no. 1, pp. 115–124, 2018.

Arul Oli S, and Arockiam L, “Enhanced obfuscation technique for data confidentiality in public cloud storage”, In MATEC Web of Conferences, vol. 40, 2016.

Dmitry Zegzhda P, Usov E S, Nikol’skii A V, and Yu Pavlenko E, “Use of intel SGX to ensure the confidentiality of data of cloud users”, Automatic Control and Computer Sciences, vol. 51, no. 8, pp. 848–854, 2017.

Sajay K R, Suvanam Sasidhar Babu, and Yellepeddi Vijayalakshmi, “Enhancing the security of cloud data using hybrid encryption algorithm”, Journal of Ambient Intelligence and Humanized Computing, pp. 1–10, 2019.

Prabu Kanna G, and Vasudevan V, “A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data”, Cluster Computing, pp. 1–9, 2018.

Nagaraju P, Naga Malleswara Rao N, “Obfuscation Techniques in Cloud Computing: A Systematic Survey”, International Journal of Scientific & Technology Research, pp. 1097–1102, 2019.