%0 Journal Article %T Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing %A J. Athena %A V. Sumathy %J Circuits and Systems %P 77-92 %@ 2153-1293 %D 2017 %I Scientific Research Publishing %R 10.4236/cs.2017.83005 %X Numerous advancements in the Information Technology (IT) require the proper security policy for the data storage and transfer among the cloud. With the increase in size of the data, the time required to handle the huge-size data is more. An assurance of security in cloud computing suffers various issues. The evolution of cryptographic approaches addresses these limitations and provides the solution to the data preserving. There are two issues in security assurance such as geographical distribution and the multi-tenancy of the cloud server. This paper surveys about the various cryptographic techniques with their key sizes, time required for key/signature generation and verification constraints. The survey discusses the architecture for secure data transmissions among the devices, challenges raised during the transmission and attacks. This paper presents the brief review of major cryptographic techniques such as Rivest, Shamir Adleman (RSA), Dffie Hellman and the Elliptic Curve Cryptography (ECC) associated key sizes. This paper investigates the general impact of digital signature generation techniques on cloud security with the advantages and disadvantages. The results and discussion section existing in this paper investigate the time consumption for key/signature generation and verification with the key size variations effectively. The initialization of random prime numbers and the key computation based on the points on the elliptic curve assures the high-security compared to the existing schemes with the minimum time consumption and sizes in cloud-based applications. %K Cloud Computing %K Cryptography %K RSA %K Diffie Hellman %K Elliptic Curve Cryptography %K Digital Signature %U http://www.scirp.org/journal/PaperInformation.aspx?PaperID=75788