Enabled security based on elliptic curve cryptography with optimal resource allocation schema in cloud computing environment | IEEE Conference Publication | IEEE Xplore