Loading

Secure Data Transaction using ECC in Corporate Environment
D. Sathiya1, S. Albert Rabara2
1D. Sathiya, Research Scholar, Department of Computer Science, St. Joseph’s College, Tiruchy, India.
2S. Albert Rabara, Department of Computer Science, St. Joseph’s College, Tiruchy, India.

Manuscript received on 02 April 2019 | Revised Manuscript received on 08 May 2019 | Manuscript published on 30 May 2019 | PP: 2389-2392 | Volume-8 Issue-1, May 2019 | Retrieval Number: A1931058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The encryption/decryption techniques are used to provide secure and fast data access. In this paper, we consider the data transaction from the user’s mobile to company’s server in the corporate environment with restricted accessibility at different levels of employees. To provide this secure and quick accessibility of data, we propose an ECC algorithm with DCT for different data types such as text, image, audio and video files. The efficiency of this approach is validated through encryption/decryption and throughput time analysis
Index Terms: Discrete Cosine Transform, Elliptic Curve Cryptography

Scope of the Article: Environmental Engineering